✅Quiz
Last updated
Last updated
Q1 Which of the below is/are accurate?
Q2 Audit reports from audit firms typically include
Q3 These audit techniques are especially well-suited for smart contracts (compared to Web2 programs)
Q4 The following kinds of findings may be expected during audits
Q5 Which of the following is/are true?
Q6 Automated tools for smart contract analysis
Q7 Which of the following is/are true?
Q8 Which of the following is/are correct about false positives?
Q9 Audit findings
Q10 Which of the following is/are typical manual review approach(es)?
Q11 Access control analysis is a critical part of manual review for the reason(s) that
Q12 Which of the following is/are true about vulnerability difficulty and impact?
Q13 Application-level security constraints
Q14 Which of the following is/are typically true?
Comment:
Static analysis: is a technique of analyzing program properties without actually executing the program.
from point 23 of Security Audit Techniques & Tools 101 - by Secureum
Fuzzing: or fuzz testing is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program.
from point 24 of Security Audit Techniques & Tools 101 - by Secureum
Instead of enumerating reachable states one at a time, the state space can sometimes be traversed more efficiently by considering large numbers of states at a single step.
from point 25.4 of Security Audit Techniques & Tools 101 - by Secureum
Q15 Which of the following is/are generally true about asset flow analysis?
Q16 Which of the following is/are generally true about control and data flow analyses?
Comment:
Evaluating control flow: Interprocedural (procedure is just another name for a function) control flow is typically indicated by a call graph which shows which functions (callers) call which other functions (callees), across or within smart contracts
from point 93.1 of Security Audit Techniques & Tools 101 - by Secureum
Evaluating control flow: Intraprocedural (i.e. within a function) control flow is dictated by conditionals (if/else), loops (for/while/do/continue/break) and return statements.
from point 93.2 of Security Audit Techniques & Tools 101 - by Secureum
Evaluating data flow: Interprocedural data flow is evaluated by analyzing the data (variables/constants) used as argument values for function parameters at call sites
from point 94.1 of Security Audit Techniques & Tools 101 - by Secureum
Evaluating data flow: Intraprocedural data flow is evaluated by analyzing the assignment and use of (state/memory/calldata) variables/constants along the control flow paths within functions.
from point 94.2 of Security Audit Techniques & Tools 101 - by Secureum