What does "defensive programming" mean?
Which of the following statements about a setuid program is/are true?
Complete the sentence: A characteristic of _____ programming is that it handles internal errors gracefully.
A program needs to obtain a set of web pages over the network, as well as perform other network functions.
Which of these best describes how this should be done?
What is the LAND attack?
Which of the following is true?
Consider the environment in which a program executes. You need to be concerned about the differences between that environment and the one in which the program was developed because:
A network server runs with no privileges.
Why is the robustness and security of this server of concern?
Which of the following is the most correct?
Robust programming is important because:
What is the best way to ensure no data is added to or removed from the system with a DVD?
Why are assumptions made by a programmer and program so important to secure programming?
A user does not trust the system administrator on a system. The administrator has root or admin access. So the user writes a program to encrypt her files when not in use, and decrypt them when she need to use them. Assuming the cipher used cannot be broken easily (for example, RSA with 4096 bit keys, or AEC-192), how good is this procedure?
When writing a secure, robust program, which of the following should you check or do? (Select all that apply.)