#cybersecurity #coursera #quiz #solution #network #injection #hacking
Correct
Correct, all operating systems are susceptible.
Incorrect
Incorrect, review the video OS injection Part 2.
Correct
Correct, Safe coding practice avoides using OS commands when it can be avoided.
Correct
Correct! Safe coding practice does not always runs commands through a shell interperter.
Correct
Correct, Safe coding practice uses library functions when running OS commands.
Correct
Correct! Safe coding practice does not use blacklists but prefers the use of whitelists.
Comments