Jay is using the EnTrial Key Generator software to create software keys for the programs he has created. To create the unlock key in the software, what two inputs must Jay use?
A. Vector markup ID
B. Personal ID
C. GUID
D. Generated code
George is the CIO for the US Department of Defense. George's education and work experience cover everything from Systems Administration to developing complex software programs for the government. With many new federal regulations put forth by the US Department of Homeland Security, every single aspect of George's control must be secured and protected from attack. George is currently looking to purchase customized communications software for sending instant messages to branches of the DoD all over the world.
What set of security standards should George ensure the software he purchases be developed under?
A. Common Criteria
B. ISO 199776
C. Code Containment
D. Code Access Security
Heather has built a new Linux kernel for her machine and wants to use the grub boot loader. Which file should she edit to tell the computer how to boot up properly?
A. /boot/grub/menu.lst
B. /usr/src/linux/arch/i386/boot/menu.lst
C. /etc/dev/boot/menu.lst
D. /etc/boot/lilo.conf
What function can be used with SQL to encrypt user suppliedpasswords so that they can be compared with the encrypted passwords stored on the SQL server?
A. DESpassword()
B. userencrypt()
C. passwordin()
D. pwdencrypt()
Lyle is writing some code in VB.NET and is implementing some build-in security. What type of .NET security is Lyle using in the following code?
public class Myclass1
Public Sub New()
End Sub
Public Sub MyMethods()
Dim Perm As New MyPermission()
Perm.Demand()
End Sub
Pub Sub YourMethod()
End Sub
End Class
A. Imperative security
B. Explicit security
C. Implicit security
D. Declarative security
When the following code is compiled and run is a program what size block will be used to hold name string?
#include
int main(int argc, char **argv)
{
char target[5]="TTTT";
char attacker[11]="AAAAAAAAAA";
strcpy(attacker, " DDDDDDDDDDDDDD");
printf("% \n", target);
return 0;
}
A. 16 bytes
B. 28 bytes
C. 32 bytes
D. 8 bytes
What compression library is used by wiretap, the packet analyzer reader for Wireshark?
A. wtapbil
B. pclib
C. winrar
D. zllib
Harold is creating an Oracle Label Security Policy on his server. He has define the policy and defined the components of the labels already. Now Harold creates the labels dynamically using the TO_DATA_LABEL function:
INSERT INTO emp (ename, empnum, hr_label)
VALUES ('FGRIFFIN', 10 to_data_label ('HR', 'SENSITIVE'));
Harold gets an error reffering to permission when he tries to run this function. What authority must Harold have to run the TO_DATA_LABEL function?
A. EXECUTE
B. WRITE
C. INSERT
D. CREATE
What encryption algorithm is used by PERL crypt() function?
A. Skipjack
B. 3DES
C. DES
D. AES
William, a software developer just starting his career, was asked to create a website in PHP that would allow visitors to enter a month and a year for their birth date. The PHP code he creates has to validate the input after it is entered. If
William uses the following code, what could a malicious user input to the year value to actually delete the whole website?
$month = $_GET['month'];
$year = $_GET['year'];
exec("cal $month $year", $result);
print "
";";foreach($result as $r)
{
print "$r
";}
print "
A. ";gf -rm *"
B. ";dfr -php *"
C. ";php -rf *"
D. ";rm -rf *"