Question 1

What is the difference between robust programming and secure programming?


Question 2

Fill in the blanks with the correct phrases from options below:

Security policies _______ and security mechanisms ______.


Question 3

Consider a program that uses a cryptographic library obtained from a third party.

Which of the following is most likely to be true?


Question 4

When a user tries to log in, she enters a login name and a password. The computer checks that the login name is that of an authorized user and if not, gives the error message "Bad login name" and requests another name and password. If the login name is valid, it checks the password and if that does not correspond to the named user, it gives the error message "Bad password" and requests another password.

Which of the following best describes this procedure?


Question 5

What are the two key concepts of secure programming?


Question 6

Which of the following should you do in secure programming?


Question 7

Complete the sentence:

Buffer overflows are _______ a security problem.