Answer the following statements true (T) or false (F)

1. Defensive programming requires a changed mindset to traditional programming practices.
2. To counter XSS attacks a defensive programmer needs to explicitly identify any assumptions as to the form of input and to verify that any input data conform to those assumptions before any use of the data.
3. Injection attacks variants can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it.
4. Cross-site scripting attacks attempt to bypass the browser’s security checks to gain elevated access privileges to sensitive data belonging to another site.
5. To prevent XSS attacks any user supplied input should be examined and any dangerous code removed or escaped to block its execution.


1. True
2. False
3. True
4. False
5. True

Computer Science & Information Technology

You might also like to view...

A(n) ____ is a name that refers to a piece of the program's memory, in which a value can be stored, retrieved, and changed.

A. element B. class C. variable D. object

Computer Science & Information Technology

If a column is too narrow to display data, a series of number signs (#) is displayed

Indicate whether the statement is true or false

Computer Science & Information Technology

Under the Control Panel, what console contains Print Management, Computer Management, and Event Viewer?

A. Windows Firewall B. System C. Administrative Tools D. Admin Page

Computer Science & Information Technology

Which of the following is NOT true about enhancing a report with grouping and sorting?

A) The Report Wizard gives you the opportunity to sort and group records, but sometimes seeing the report changes your mind about what and how to group and sort. B) You can change the sorting and grouping options from either Layout or Report view. C) Groups are added to a section of the report called the group header. D) Calculations performed on a group in a report are added to a section called the group footer.

Computer Science & Information Technology