Secure coding practices week 2 quiz

Order Description

Question 1

Which of the principles does having an all-powerful system administration account violate? Pick the best one.

  • Principle of open design
  • Principle of complete mediation
  • Principle of least privilege
  • Principle of economy of mechanism

.

Question 2

Which of the following reflects the principle of complete mediation?

  • Access permissions for a file are checked when a process that will access the file starts.
  • Access permissions for a file are checked when the file is opened.
  • Access permissions for a file are checked when the file is opened, and are periodically rechecked until the file is closed.
  • Access permissions for a file are checked whenever the file is accessed.

 

Question 3

Which of the following underlie software security design principles?

  • Secrecy of controls
  • Complexity of controls
  • Minimizing cost of controls
  • Simplicity of controls

 

Question 4

Which of the following underlie software security design principles?

  • Restrictiveness of controls
  • Inclusivity of controls
  • Incomprehensibility of controls
  • Validation of controls

 

Question 5

A virtual machine isolates its operating system and processes from the host it runs on. Which principle best reflects this?

  • Principle of separation of privilege
  • Principle of least common mechanism
  • Principle of psychological acceptability
  • Principle of fail-safe defaults

 

Question 6

Considering the basic file access controls of Windows and Linux systems (called "systems" here), which of the following is true?

  • The file access mechanisms do not enforce least privilege.
  • The file access mechanisms enforce least privilege because the permission can be on a per-group basis.
  • The file access mechanisms enforce least privilege because users can control access on a per-user basis.
  • The file access mechanisms enforce least privilege because the permissions are checked on each access.

 

Question 7

To change to the root user, the su(1) program in FreeBSD requires that the user know the root password and that the user be a member of group 0. Which principle does this reflect? Pick the best one.

  • Principle of separation of privilege
  • Principle of least astonishment
  • Principle of least privilege
  • Principle of complete mediation