What is the primary task of IT professionals regarding application vulnerabilities?
Installing security patches for applications with vulnerabilities such as buffer overflow or SQL injection.
What process is used to ensure the security of an application during development?
Quality assurance testing that includes functionality and security checks.
What is input validation in application development?
Ensuring that unexpected data input into the application is not interpreted by the application.
What is fuzzing?
An automated process where random types of data are input into applications to test their behavior.
What are cookies in the context of web applications?
Small bits of information stored in browsers that help track user activity and maintain sessions.
What is the purpose of secure cookies?
To require cookies to be transferred only over HTTPS or an encrypted connection.
What is static code analysis?
A process where code is analyzed to find vulnerabilities such as buffer overflows and database injections.
What does SAST stand for?
Static Application Security Testing.
True or False: Static code analysis can find all types of security vulnerabilities.
False.
What is code signing?
A process that ensures the integrity and origin of an application by digitally signing the code.
What does sandboxing do for an application?
Restricts the application to only access necessary data for its operation.
What is the role of monitoring in application security?
To track application use and identify security concerns or unusual activities.
Fill in the blank: The process of applying random data inputs to test applications is called _______.
fuzzing.
What is the risk associated with installing applications?
Potential embedding of malware within the application.
What does a static analyzer output help developers do?
Identify vulnerabilities and suggest corrections in code.
What is the significance of a developer’s signed key in code signing?
It allows the developer to sign any code they distribute.
What security measure can limit an application’s access to personal information on a mobile device?
Sandboxing.
What type of encryption is used in code signing?
Asymmetric encryption.
What can application developers monitor to detect SQL injection attempts?
Logs generated from monitoring services.
True or False: Cookies can contain malware.
False.
What is the expected format for input validation when entering a zip code?
A specific number of characters or a certain set of numbers.
What happens if input validation fails?
The application prompts the user to correct the input.
What type of issues can static code analyzers identify?
Buffer overflows, database injections, and other vulnerabilities.
What is one limitation of static code analysis?
It may not detect vulnerabilities related to cryptography implementation.