Question: QUESTION 26 To protect against injection attacks What steps must programs take: Validation Sanitization Canonicalization & Normalization Interrogation All of the above 2 points QUESTION
QUESTION 26
- To protect against injection attacks What steps must programs take:
| Validation | ||
| Sanitization | ||
| Canonicalization & Normalization | ||
| Interrogation | ||
| All of the above |
2 points
QUESTION 27
- What Security policy defines what Java class?
| SecurityException | ||
| SecurityManager | ||
| SecurePolicy | ||
| AccessSecurity |
2 points
QUESTION 28
- Many programs accept untrusted data originating from
| validated users, | ||
| network connectionless, | ||
| other untrusted sources | ||
| none of the above |
2 points
QUESTION 29
- What type of API requires data to be validated before being passed through?
| Trust boundary | ||
| Distrust boundary | ||
| all of the above | ||
| XML |
2 points
QUESTION 30
- Principle of least privilege is ___.
| Executing with maximum privilegesb. | ||
| A program is one whose sequentially consistent executions lack data races | ||
| Executing with minimal privileges | ||
| A Java class that defines a security policy for Java code |
2 points
QUESTION 31
- What is Validation?
| process of ensuring that input data falls within the expected domain of valid program input | ||
| process of lossless reduction of the input to its equivalent simplest known form | ||
| process of ensuring that data conforms to the requirements of the subsystem to which it is passed |
2 points
QUESTION 32
- What are the methods of preventing SQL injection (select one)?
| Sanitizing and validating untrusted input, and parameterizing queries | ||
| Deleting temporary files and refragging | ||
| Installing an antivirus and monitoring network activity | ||
| Taking a secure programming course and using a VPN |
2 points
QUESTION 33
- Which is a Java class that defines a security policy for Java code.
| JobState | ||
| Future | ||
| Oid | ||
| SecurityManager |
2 points
QUESTION 34
- Which is a Java class that defines a security policy for Java code.
| JobState | ||
| Future | ||
| Oid | ||
| SecurityManager |
2 points
QUESTION 35
- What are the methods of preventing SQL injection (select one)?
| Sanitizing and validating untrusted input, and parameterizing queries | ||
| Deleting temporary files and refragging | ||
| Installing an antivirus and monitoring network activity | ||
| Taking a secure programming course and using a VPN |
2 points
QUESTION 36
- What method from the Executor class returns a fixed-size thread pool with an upper limit on the number of concurrently executing tasks and maintains an unbounded queue for holding tasks while the thread pool is full?
| ) newFixedThreadPool() | ||
| ) newPool() | ||
| ) FixedThreadPool() | ||
| ) newThread() |
2 points
QUESTION 37
- What is Serialization?
| is the process of converting an object into a stream of bytes to store the object or transmit it to memory, a database, or a file. | ||
| A correctly synchronized program is one whose sequentially consistent executions lack data races. | ||
| Java class that denes a security policy for Java code. |
2 points
QUESTION 38
- ScheduledExecutor is not an interface of which of the following interfaces?
| ScheduledExecutorService | ||
| Executor | ||
| java.util.concurrent | ||
| ExecutorService |
2 points
QUESTION 39
- A ___ program is one whose sequentially consistent executions lack data races.
| Correctly Synchronized | ||
| Utility | ||
| Final | ||
| Microcode |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
