Quiz


These quiz questions are provided for your further understanding. See Appendix A, "Answers to Quiz Questions," for the answersbut don't peek!

1:

What motives were behind the break-in of the NORAD computer system in the movie WarGames?

2:

True or False: Threat modeling is an informal process done by the software testers to decide where best to apply their tests for security vulnerabilities.

3:

The JPEG Virus was caused by a buffer overrun bug. Look back to the Generic Code Review Checklist in Chapter 6. What two categories of checks best describe why this overrun occurred?

4:

The Most Recently Used (MRU) file list that appears when you attempt to open a file in a standard Windows application is an example of what type of data that could be a security vulnerability?

5:

What are the two types of extra, potentially unsecure, data that can be unintentionally written when a file is saved to a disk?



    Software Testing
    Lessons Learned in Software Testing
    ISBN: 0471081124
    EAN: 2147483647
    Year: 2005
    Pages: 233

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net