Processes having the "CAP_NET_BIND_SERVICE" can listen on which ports?
A. Any TCP port over 1024
B. Any UDP port under 1024
C. Any TCP port under 1024
D. Any UDP port over 1024
Fred is planning on using the windows socket application ClientApp.exe program to create a client-side application that his employees will use. This program will access backend programs from two different remote sites over WAN connections. If Fred does not make any modifications to the ClientApp.exe default settings, what port must he have the network engineer open in order for the application to communicate?
A. 21
B. 23
C. 25
D. 80
What would be the result of the following code?
#include
#include
int main(int argc, char *argv[])
{
char *input=malloc(20);
char *output=malloc(20);
strcpy(output, "normal output");
strcpy(input, argv[1]);
printf("input at %p: %s\n", input, input);
printf("output at %p: %s\n", output, output);
printf("\n\n%s\n", output);
}
A. Stack buffer overflow
B. Heap overflow
C. Query string manipulation
D. Pointer Subterfuge
Wayne is a gaming software developer for a large video gaming company in Los Angeles. Wayne has just completed developing a new action/adventure game for the company that is to be released soon. To protect the company's copyright on the game, Wayne would like to incorporate a technology that will restrict the use of the digital files by controlling access, altering, sharing, copying, printing, and saving.
What technology does Wayne want to use?
A. ARM
B. WRM
C. DRM
D. Diffusion
Sherry is programming an online game and is trying to prevent security threats from being introduced into the game. She is also trying to prevent any kind of online cheating by searching for possible anomalies. Sherry especially wants to prevent cheating where a program or application is used to replace human reaction to produce superior results.
What category of online cheating is she most concerned about?
A. Authoritative clients
B. Reflex augmentation
C. Artificial intelligence intervention
D. Vector-time augmentation
What function can be used with SQL to encrypt user suppliedpasswords so that they can be compared with the encrypted passwords stored on the SQL server?
A. DESpassword()
B. userencrypt()
C. passwordin()
D. pwdencrypt()
What two encryption methods are used by the Secure Electronic Transaction system?
A. RSA
B. AES
C. DES
D. 3DES
Fred wants to create his web page using AJAX to make them dynamic and give them the ability to use and share data. After an internal auditor examines the compliance of Fred's page, he says that they cannot be used if external visitors will be accessing the pages.
Why would the auditor not let Fred publish the pages written with AJAX?
A. Users with Java enabled will not be able to read pages
B. Not supported in older browsers
C. Users with XML enabled will not be able to read pages
D. Not supported in newer browsers
Gerald is a web security consultant for Protectors International. Gerald's main responsibility is to search the Internet for malicious and deceitful sites that the public should be aware of. Gerald was tipped off about a particular site and is now
looking over its source code in a protected environment. Gerald finds the following snippet particularly interesting. What has Gerald stumbled upon?
A. Hidden post command
B. Hidden form fields
C. JavaScript hijacking
D. XSS attack
William is the lead programmer for Gummerson, Inc., a software company located in San Francisco. Gummerson is looked upon as one of the leading software development companies for medical and health related applications. William believes that his company is so successful because they believe in involving the user or client in the design and development of the programs.
What software development methodology does Gunnerson, Inc. use when creating applications for clients?
A. Fountain
B. RAD
C. JAD
D. Waterfall