66. What do you call an attacker who can embed malicious commands in application parameters resulting in an external system executing those commands on behalf of the Web application?
a. Buffer overflows
b. Injection flaws
c. Denial-of-service
d. Improper error handling
67. Both black-box and white-box testing are performed during which of the following?
a. Unit testing
b. Integration testing
c. System testing
d. Acceptance testing
Integration testing is incorrect because it comes after completion of unit tests. An integration test is performed to examine how units interface and interact with each other with the assumption that the units and the objects (for example, data) they manipulate have all passed their unit tests. Software integration tests check how the units interact with other software libraries and hardware.
System testing is incorrect because it comes after completion of the integration tests. It tests the completely integrated system and validates that the software meets its requirements.
Acceptance testing is incorrect because it comes after completion of integration tests. It is testing of user requirements in an operational mode conducted by end users and computer operations staff.
68. If manual controls over program changes were weak, which of the following would be effective?
a. Automated controls
b. Written policies
c. Written procedures
d. Written standards
69. Which of the following defines a management’s formal acceptance of the adequacy of an application system’s security?
a. System certification
b. Security certification
c. System accreditation
d. Security accreditation
System certification is the technical evaluation of compliance with security requirements for the purpose of accreditation. The technical evaluation uses a combination of security evaluation techniques (for example, risk analysis, security plans, validation, verification, testing, security safeguard evaluation, and audit) and culminates in a technical judgment of the extent to which safeguards meet security requirements.
Security certification is a formal testing of the security controls (safeguards) implemented in the computer system to determine whether they meet applicable requirements and specifications.