Quiz

Q1 Which of the below is/are accurate?

Q2 Audit reports from audit firms typically include

Q3 These audit techniques are especially well-suited for smart contracts (compared to Web2 programs)

Q4 The following kinds of findings may be expected during audits

Q5 Which of the following is/are true?

Q6 Automated tools for smart contract analysis

Q7 Which of the following is/are true?

Q8 Which of the following is/are correct about false positives?

Q9 Audit findings

Q10 Which of the following is/are typical manual review approach(es)?

Q11 Access control analysis is a critical part of manual review for the reason(s) that

Q12 Which of the following is/are true about vulnerability difficulty and impact?

Q13 Application-level security constraints

Q14 Which of the following is/are typically true?

Comment:

Static analysis: is a technique of analyzing program properties without actually executing the program.

from point 23 of Security Audit Techniques & Tools 101 - by Secureum

Fuzzing: or fuzz testing is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program.

from point 24 of Security Audit Techniques & Tools 101 - by Secureum

Instead of enumerating reachable states one at a time, the state space can sometimes be traversed more efficiently by considering large numbers of states at a single step.

from point 25.4 of Security Audit Techniques & Tools 101 - by Secureum

Q15 Which of the following is/are generally true about asset flow analysis?

Q16 Which of the following is/are generally true about control and data flow analyses?

Comment:

Evaluating control flow: Interprocedural (procedure is just another name for a function) control flow is typically indicated by a call graph which shows which functions (callers) call which other functions (callees), across or within smart contracts

from point 93.1 of Security Audit Techniques & Tools 101 - by Secureum

Evaluating control flow: Intraprocedural (i.e. within a function) control flow is dictated by conditionals (if/else), loops (for/while/do/continue/break) and return statements.

from point 93.2 of Security Audit Techniques & Tools 101 - by Secureum

Evaluating data flow: Interprocedural data flow is evaluated by analyzing the data (variables/constants) used as argument values for function parameters at call sites

from point 94.1 of Security Audit Techniques & Tools 101 - by Secureum

Evaluating data flow: Intraprocedural data flow is evaluated by analyzing the assignment and use of (state/memory/calldata) variables/constants along the control flow paths within functions.

from point 94.2 of Security Audit Techniques & Tools 101 - by Secureum

Last updated