#cybersecurity #coursera #quiz #solution #network
1.
Question 1Which of the following statements is True?
2.
Question 2Which vulnerability is being exploited in an OS Command Injection attack?
3.
Question 3What is a simple but effective way to protect against DLL hijacking?
4.
Question 4True or False: Safe coding practice runs code with the least possible privilege.
5.
Question 5True or False: Safe coding practice always specifies relative paths when running applications or using shared libraries.
6.
Question 6True or False: Safe coding practice does not let user input reach an OS command unchanged.
7.
Question 7A hacker exfiltrating data by injecting an HTTPrequest command is an example of which type of SQL Injection attack?
8.
Question 8Protecting against SQL Injection attacks by sanitizing user input can be accomplished by which two (2) of the following techniques?
9.
Question 9True or False: Limiting database user permissions is an ineffective strategy in preventing SQL Injection attacks since the injected code will run directly against the database regardless of the permission levels that have been set.
10.
Question 10Which of the following will help reduce the SQL Injection attack surface?
11.
Question 11When developing an application, using NoSQL instead of MySQL will have what effect on the applications susceptibility to SQL Injection attacks?
Comments