2173 MC TEST

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/14

flashcard set

Earn XP

Description and Tags

fk2173

Last updated 6:05 AM on 5/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

15 Terms

1
New cards
<p>q9</p>

q9

simplest:

  • %.nx

  • n=number

  • number=written value

  • %n=takes number of printed chars, writes that int into memory

 

E

8+8+8+8=32

32+24=56

%.8x=prints 8chars

2
New cards
<p>q10</p>

q10

C, generated errors, can disclose program functionality info

3
New cards
<p>q11</p>

q11

E

find code vul

unforseen computation state

false results attacker exploit

security flaw, source code unavail

4
New cards
<p>q12</p>

q12

A

SAST-analyse code, not running

Fuzzing-send random data, run, check crash

5
New cards
<p>q13</p>

q13

B
apply security, all SDL phases

6
New cards
<p>q14</p>

q14

D

CSRF-

Cross-site request forgery

trick authenticated users, execute unwanted actions, web app, authenticated

7
New cards
<p>q15</p>

q15

C)

include anti-csrf tokens in forms, verify request authenticity

8
New cards
<p>q16</p>

q16

A)

follow industry best practices, design principles

9
New cards
<p>q17</p>

q17

B)

attacker can craft certain input to steal information, but cannot inject data to memory

10
New cards
term image

A,B,C

 

exploit vul, active test security control, bypass sec con

11
New cards
<p>q19</p>

q19

A)

penetration testing:

simulate attack, evaluate, malicious activity resistance

12
New cards
<p>q20</p>

q20

B)

True:

 risk-based testing, identify security issues, design level

False:

correct software, security bugs, no run

search-based tools, static code analysers, no analyse relationships

no fault negative test, no faults

13
New cards
<p>q21</p>

q21

C)

 

inject SQL (structured query language) code, web forms/input fields, manipulate database

14
New cards
<p>q22</p>

q22

D)

threat modelling in SDLC:

proactively, address security concerns

15
New cards
<p>q23</p>

q23

B)

XXS attack:

steal sensitive info