Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 26 To protect against injection attacks What steps must programs take: Validation Sanitization Canonicalization & Normalization Interrogation All of the above 2 points QUESTION

QUESTION 26

  1. To protect against injection attacks What steps must programs take:

Validation

Sanitization

Canonicalization & Normalization

Interrogation

All of the above

2 points

QUESTION 27

  1. What Security policy defines what Java class?

SecurityException

SecurityManager

SecurePolicy

AccessSecurity

2 points

QUESTION 28

  1. Many programs accept untrusted data originating from

validated users,

network connectionless,

other untrusted sources

none of the above

2 points

QUESTION 29

  1. What type of API requires data to be validated before being passed through?

Trust boundary

Distrust boundary

all of the above

XML

2 points

QUESTION 30

  1. Principle of least privilege is ___.

Executing with maximum privilegesb.

A program is one whose sequentially consistent executions lack data races

Executing with minimal privileges

A Java class that defines a security policy for Java code

2 points

QUESTION 31

  1. What is Validation?

process of ensuring that input data falls within the expected domain of valid program input

process of lossless reduction of the input to its equivalent simplest known form

process of ensuring that data conforms to the requirements of the subsystem to which it is passed

2 points

QUESTION 32

  1. What are the methods of preventing SQL injection (select one)?

Sanitizing and validating untrusted input, and parameterizing queries

Deleting temporary files and refragging

Installing an antivirus and monitoring network activity

Taking a secure programming course and using a VPN

2 points

QUESTION 33

  1. Which is a Java class that defines a security policy for Java code.

JobState

Future

Oid

SecurityManager

2 points

QUESTION 34

  1. Which is a Java class that defines a security policy for Java code.

JobState

Future

Oid

SecurityManager

2 points

QUESTION 35

  1. What are the methods of preventing SQL injection (select one)?

Sanitizing and validating untrusted input, and parameterizing queries

Deleting temporary files and refragging

Installing an antivirus and monitoring network activity

Taking a secure programming course and using a VPN

2 points

QUESTION 36

  1. What method from the Executor class returns a fixed-size thread pool with an upper limit on the number of concurrently executing tasks and maintains an unbounded queue for holding tasks while the thread pool is full?

) newFixedThreadPool()

) newPool()

) FixedThreadPool()

) newThread()

2 points

QUESTION 37

  1. What is Serialization?

is the process of converting an object into a stream of bytes to store the object or transmit it to memory, a database, or a file.

A correctly synchronized program is one whose sequentially consistent executions lack data races.

Java class that denes a security policy for Java code.

2 points

QUESTION 38

  1. ScheduledExecutor is not an interface of which of the following interfaces?

ScheduledExecutorService

Executor

java.util.concurrent

ExecutorService

2 points

QUESTION 39

  1. A ___ program is one whose sequentially consistent executions lack data races.

Correctly Synchronized

Utility

Final

Microcode

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Automating Access Databases With Macros

Authors: Fish Davis

1st Edition

1797816349, 978-1797816340

More Books

Students also viewed these Databases questions

Question

What are Measures in OLAP Cubes?

Answered: 1 week ago

Question

How do OLAP Databases provide for Drilling Down into data?

Answered: 1 week ago

Question

How are OLAP Cubes different from Production Relational Databases?

Answered: 1 week ago