Question: QUESTION 26 To protect against injection attacks What steps must programs take: Validation Sanitization Canonicalization & Normalization Interrogation All of the above 2 points QUESTION

QUESTION 26

  1. To protect against injection attacks What steps must programs take:

Validation

Sanitization

Canonicalization & Normalization

Interrogation

All of the above

2 points

QUESTION 27

  1. What Security policy defines what Java class?

SecurityException

SecurityManager

SecurePolicy

AccessSecurity

2 points

QUESTION 28

  1. Many programs accept untrusted data originating from

validated users,

network connectionless,

other untrusted sources

none of the above

2 points

QUESTION 29

  1. What type of API requires data to be validated before being passed through?

Trust boundary

Distrust boundary

all of the above

XML

2 points

QUESTION 30

  1. Principle of least privilege is ___.

Executing with maximum privilegesb.

A program is one whose sequentially consistent executions lack data races

Executing with minimal privileges

A Java class that defines a security policy for Java code

2 points

QUESTION 31

  1. What is Validation?

process of ensuring that input data falls within the expected domain of valid program input

process of lossless reduction of the input to its equivalent simplest known form

process of ensuring that data conforms to the requirements of the subsystem to which it is passed

2 points

QUESTION 32

  1. What are the methods of preventing SQL injection (select one)?

Sanitizing and validating untrusted input, and parameterizing queries

Deleting temporary files and refragging

Installing an antivirus and monitoring network activity

Taking a secure programming course and using a VPN

2 points

QUESTION 33

  1. Which is a Java class that defines a security policy for Java code.

JobState

Future

Oid

SecurityManager

2 points

QUESTION 34

  1. Which is a Java class that defines a security policy for Java code.

JobState

Future

Oid

SecurityManager

2 points

QUESTION 35

  1. What are the methods of preventing SQL injection (select one)?

Sanitizing and validating untrusted input, and parameterizing queries

Deleting temporary files and refragging

Installing an antivirus and monitoring network activity

Taking a secure programming course and using a VPN

2 points

QUESTION 36

  1. What method from the Executor class returns a fixed-size thread pool with an upper limit on the number of concurrently executing tasks and maintains an unbounded queue for holding tasks while the thread pool is full?

) newFixedThreadPool()

) newPool()

) FixedThreadPool()

) newThread()

2 points

QUESTION 37

  1. What is Serialization?

is the process of converting an object into a stream of bytes to store the object or transmit it to memory, a database, or a file.

A correctly synchronized program is one whose sequentially consistent executions lack data races.

Java class that denes a security policy for Java code.

2 points

QUESTION 38

  1. ScheduledExecutor is not an interface of which of the following interfaces?

ScheduledExecutorService

Executor

java.util.concurrent

ExecutorService

2 points

QUESTION 39

  1. A ___ program is one whose sequentially consistent executions lack data races.

Correctly Synchronized

Utility

Final

Microcode

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!