Secure Software Final Exam
Questions With 100% Verified Answers
True or False? Defining a default case is not necessary for most
switch statements -
correct answer ✅False
True or False? According to CERT, approximately 50% of computer
attacks are caused by buffer overflow -
correct answer ✅True
The information in error logs should be sufficient for ___ and
insufficient for ___ -
correct answer ✅internal use, external use
True or False? A data canary can actively signal that it has been
rewritten -
correct answer ✅False
True or False? An operator can be overloaded to define
functionality that is drastically different from the original operator -
correct answer ✅True
,Secure Software Final Exam
Questions With 100% Verified Answers
________________ is when a high-level language is converted to
machine code prior to installation and execution -
correct answer ✅Compiled code
True or False? Regular expressions can be used to validate input in
any circumstance -
correct answer ✅False
A ___ is an attack that stores more information in a location than it
can hold -
correct answer ✅buffer overflow
______________ is when a high-level language is converted to an
intermediary language for execution. -
correct answer ✅Interpreted code
True or False? An API can allow a system to call functionality from
another executable or external library. -
correct answer ✅True
,Secure Software Final Exam
Questions With 100% Verified Answers
True or False? Unsafe input characters should be removed from
input strings provided by any user -
correct answer ✅True
True or False? A just-in-time compiled system is being constantly
recompiled before each execution and may not contain the same
code between executions -
correct answer ✅True
True or False? Error logs can be used by an attacker to gather
information about the internal workings of a system. -
correct answer ✅True
A ___ is used to prevent a return value from being overwritten. -
correct answer ✅data canary
A ___ is a type of host that processes most of the business logic of a
system with only occasional connections to a server -
correct answer ✅thick clien
, Secure Software Final Exam
Questions With 100% Verified Answers
True or False? Programming languages are designed as an
intermediary between human language and binary -
correct answer ✅True
True or False? Array bounds checking should be directly coded into
a system rather than assumed -
correct answer ✅True
________ is the process of translating high level programming
languages into machine code -
correct answer ✅Compiling
True or False? Manipulated pointer associations can allow
unintended variables to be rewritten -
correct answer ✅True
True or False? It is safe to execute user input directly -
correct answer ✅False
True or False? The output of a program is not important from a
security perspective; only the input matters -
correct answer ✅False
Questions With 100% Verified Answers
True or False? Defining a default case is not necessary for most
switch statements -
correct answer ✅False
True or False? According to CERT, approximately 50% of computer
attacks are caused by buffer overflow -
correct answer ✅True
The information in error logs should be sufficient for ___ and
insufficient for ___ -
correct answer ✅internal use, external use
True or False? A data canary can actively signal that it has been
rewritten -
correct answer ✅False
True or False? An operator can be overloaded to define
functionality that is drastically different from the original operator -
correct answer ✅True
,Secure Software Final Exam
Questions With 100% Verified Answers
________________ is when a high-level language is converted to
machine code prior to installation and execution -
correct answer ✅Compiled code
True or False? Regular expressions can be used to validate input in
any circumstance -
correct answer ✅False
A ___ is an attack that stores more information in a location than it
can hold -
correct answer ✅buffer overflow
______________ is when a high-level language is converted to an
intermediary language for execution. -
correct answer ✅Interpreted code
True or False? An API can allow a system to call functionality from
another executable or external library. -
correct answer ✅True
,Secure Software Final Exam
Questions With 100% Verified Answers
True or False? Unsafe input characters should be removed from
input strings provided by any user -
correct answer ✅True
True or False? A just-in-time compiled system is being constantly
recompiled before each execution and may not contain the same
code between executions -
correct answer ✅True
True or False? Error logs can be used by an attacker to gather
information about the internal workings of a system. -
correct answer ✅True
A ___ is used to prevent a return value from being overwritten. -
correct answer ✅data canary
A ___ is a type of host that processes most of the business logic of a
system with only occasional connections to a server -
correct answer ✅thick clien
, Secure Software Final Exam
Questions With 100% Verified Answers
True or False? Programming languages are designed as an
intermediary between human language and binary -
correct answer ✅True
True or False? Array bounds checking should be directly coded into
a system rather than assumed -
correct answer ✅True
________ is the process of translating high level programming
languages into machine code -
correct answer ✅Compiling
True or False? Manipulated pointer associations can allow
unintended variables to be rewritten -
correct answer ✅True
True or False? It is safe to execute user input directly -
correct answer ✅False
True or False? The output of a program is not important from a
security perspective; only the input matters -
correct answer ✅False