4.1 Application Security Development and Testing Flashcards

(24 cards)

1
Q

What is the primary task of IT professionals regarding application vulnerabilities?

A

Installing security patches for applications with vulnerabilities such as buffer overflow or SQL injection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What process is used to ensure the security of an application during development?

A

Quality assurance testing that includes functionality and security checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is input validation in application development?

A

Ensuring that unexpected data input into the application is not interpreted by the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is fuzzing?

A

An automated process where random types of data are input into applications to test their behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are cookies in the context of web applications?

A

Small bits of information stored in browsers that help track user activity and maintain sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of secure cookies?

A

To require cookies to be transferred only over HTTPS or an encrypted connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is static code analysis?

A

A process where code is analyzed to find vulnerabilities such as buffer overflows and database injections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does SAST stand for?

A

Static Application Security Testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Static code analysis can find all types of security vulnerabilities.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is code signing?

A

A process that ensures the integrity and origin of an application by digitally signing the code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does sandboxing do for an application?

A

Restricts the application to only access necessary data for its operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of monitoring in application security?

A

To track application use and identify security concerns or unusual activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: The process of applying random data inputs to test applications is called _______.

A

fuzzing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the risk associated with installing applications?

A

Potential embedding of malware within the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a static analyzer output help developers do?

A

Identify vulnerabilities and suggest corrections in code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the significance of a developer’s signed key in code signing?

A

It allows the developer to sign any code they distribute.

17
Q

What security measure can limit an application’s access to personal information on a mobile device?

18
Q

What type of encryption is used in code signing?

A

Asymmetric encryption.

19
Q

What can application developers monitor to detect SQL injection attempts?

A

Logs generated from monitoring services.

20
Q

True or False: Cookies can contain malware.

21
Q

What is the expected format for input validation when entering a zip code?

A

A specific number of characters or a certain set of numbers.

22
Q

What happens if input validation fails?

A

The application prompts the user to correct the input.

23
Q

What type of issues can static code analyzers identify?

A

Buffer overflows, database injections, and other vulnerabilities.

24
Q

What is one limitation of static code analysis?

A

It may not detect vulnerabilities related to cryptography implementation.