Quiz for:
CS 50 Introduction to Cybersecurity: Software Security

Question 1

What is the purpose of bug bounty programs?

Question 2

How should you handle executing commands based on user input to avoid command injection?

Question 3

What method can be used to identify suspicious URLs without clicking on them?

Question 4

What is the main advantage of Open Source software over Closed Source?

Question 5

What is an example of a package manager for Python?

Question 6

Which function is not recommended for executing user inputs as system commands due to security risks?

Question 7

How do CSRF tokens help in preventing Cross-Site Request Forgery attacks?

Question 8

What is an example of a potential SQL injection attack input?

Question 9

How can digital signatures help verify the authenticity of software?

Question 10

What type of XSS attack involves user input that is reflected immediately without storage?

Question 11

What HTML tags are commonly targeted in phishing attacks?

Question 12

What practice is recommended to defend against SQL injection attacks?

Question 13

Which HTTP header can be used to mitigate XSS attacks by restricting inline scripts?

Question 14

Why are GET requests not recommended for state-changing operations?

Question 15

What system is used to track known vulnerabilities and exposures?