Podcast
Questions and Answers
Object-oriented languages allow for a modular approach to developing software.
Object-oriented languages allow for a modular approach to developing software.
True (A)
The operating system can control the information flow between applications.
The operating system can control the information flow between applications.
False (B)
Device drivers are always well developed and do not affect the stability of an operating system.
Device drivers are always well developed and do not affect the stability of an operating system.
False (B)
Traditional programming languages are no longer used in the programming industry.
Traditional programming languages are no longer used in the programming industry.
Hacking tools can only be used for offensive purposes.
Hacking tools can only be used for offensive purposes.
Understanding how attackers work is not important for security professionals.
Understanding how attackers work is not important for security professionals.
Emulating an attack is not a useful way to test an environment's security level.
Emulating an attack is not a useful way to test an environment's security level.
Most attack methods described in the book are not related to flaws within software code.
Most attack methods described in the book are not related to flaws within software code.
Injection of malicious code into firmware is not a potential attack avenue.
Injection of malicious code into firmware is not a potential attack avenue.
Successful attacks are mainly carried out due to the integration of security into the design and specification phases by software vendors.
Successful attacks are mainly carried out due to the integration of security into the design and specification phases by software vendors.
Software functionality has always been the main driving component of products and always will be.
Software functionality has always been the main driving component of products and always will be.
Attacks will not continue and increase in sophistication as they are not revenue streams for individuals, companies, and organized crime groups.
Attacks will not continue and increase in sophistication as they are not revenue streams for individuals, companies, and organized crime groups.