Question
QUESTION 26 To protect against injection attacks What steps must programs take: Validation Sanitization Canonicalization & Normalization Interrogation All of the above 2 points QUESTION
QUESTION 26
- To protect against injection attacks What steps must programs take:
Validation | ||
Sanitization | ||
Canonicalization & Normalization | ||
Interrogation | ||
All of the above |
2 points
QUESTION 27
- What Security policy defines what Java class?
SecurityException | ||
SecurityManager | ||
SecurePolicy | ||
AccessSecurity |
2 points
QUESTION 28
- Many programs accept untrusted data originating from
validated users, | ||
network connectionless, | ||
other untrusted sources | ||
none of the above |
2 points
QUESTION 29
- What type of API requires data to be validated before being passed through?
Trust boundary | ||
Distrust boundary | ||
all of the above | ||
XML |
2 points
QUESTION 30
- Principle of least privilege is ___.
Executing with maximum privilegesb. | ||
A program is one whose sequentially consistent executions lack data races | ||
Executing with minimal privileges | ||
A Java class that defines a security policy for Java code |
2 points
QUESTION 31
- What is Validation?
process of ensuring that input data falls within the expected domain of valid program input | ||
process of lossless reduction of the input to its equivalent simplest known form | ||
process of ensuring that data conforms to the requirements of the subsystem to which it is passed |
2 points
QUESTION 32
- What are the methods of preventing SQL injection (select one)?
Sanitizing and validating untrusted input, and parameterizing queries | ||
Deleting temporary files and refragging | ||
Installing an antivirus and monitoring network activity | ||
Taking a secure programming course and using a VPN |
2 points
QUESTION 33
- Which is a Java class that defines a security policy for Java code.
JobState | ||
Future | ||
Oid | ||
SecurityManager |
2 points
QUESTION 34
- Which is a Java class that defines a security policy for Java code.
JobState | ||
Future | ||
Oid | ||
SecurityManager |
2 points
QUESTION 35
- What are the methods of preventing SQL injection (select one)?
Sanitizing and validating untrusted input, and parameterizing queries | ||
Deleting temporary files and refragging | ||
Installing an antivirus and monitoring network activity | ||
Taking a secure programming course and using a VPN |
2 points
QUESTION 36
- What method from the Executor class returns a fixed-size thread pool with an upper limit on the number of concurrently executing tasks and maintains an unbounded queue for holding tasks while the thread pool is full?
) newFixedThreadPool() | ||
) newPool() | ||
) FixedThreadPool() | ||
) newThread() |
2 points
QUESTION 37
- What is Serialization?
is the process of converting an object into a stream of bytes to store the object or transmit it to memory, a database, or a file. | ||
A correctly synchronized program is one whose sequentially consistent executions lack data races. | ||
Java class that denes a security policy for Java code. |
2 points
QUESTION 38
- ScheduledExecutor is not an interface of which of the following interfaces?
ScheduledExecutorService | ||
Executor | ||
java.util.concurrent | ||
ExecutorService |
2 points
QUESTION 39
- A ___ program is one whose sequentially consistent executions lack data races.
Correctly Synchronized | ||
Utility | ||
Final | ||
Microcode |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started