What function should Harold use to create this connection?
Harold is writing a client-side socket program that will create a TCP connection to a remote server
to retrieve data. What function should Harold use to create this connection?
which of the following password cracking attacks?
John, a novice web user, makes a new e-mail account and keeps his password as “apple”, his
favorite fruit. John’s password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
what will he be able to prevent?
Carl is writing cgi-bin scripts in PERL for some web pages. He is concerned about malicious
users trying to exploit the site and/or the cgi-sripts. If Carl uses the following code, what will he be
able to prevent?
$filename =~ s/[^A-Za-z0-9_-.//g
Which of the following backup sites is a replica of the original site of an organization with full computer sy
Which of the following backup sites is a replica of the original site of an organization with full
computer systems as well as near-complete backups of user data?
what port must be opened on the firewalls so that the SSL LDAP traffic can pass through?
Gregory is a system administrator who oversees 15 Mac OS X servers for his company.
Three of his servers are at remote sites, but they still need to replicate and communicate with the
servers at the main office. Gregory wants to use SSL to protect the LDAP traffic between all
servers for security. For this to work properly, what port must be opened on the firewalls so that
the SSL LDAP traffic can pass through?
What category of disaster is best described as acts of terrorism, major thefts, sabotage, or labor disputes?
Organizations must assess the safety of their workplaces and consider the ability of a business to
continue despite risk impact. When assessing business continuity risks, the HR Professional must
consider several different types of disasters, their probability, and impact on an organization. What
category of disaster is best described as acts of terrorism, major thefts, sabotage, or labor
disputes?
What is the following shellcode trying to accomplish?
What is the following shellcode trying to accomplish?
int main(void) {
mkdir(“A”);
chdir(“A”);
chroot(“..//..//..//..//..//..//..//..//”);
system(“/bin/sh”)
Which of the following command line tools are available in Helix Live acquisition tool on Windows?
Which of the following command line tools are available in Helix Live acquisition tool on Windows?
Each correct answer represents a complete solution. Choose all that apply.
What coould a developer using Apple’s Cocoa accomplish by using the following script?
What coould a developer using Apple’s Cocoa accomplish by using the following script?
NSURL *MyURL = [NSURL URLWithString:@”http://www.apple.com/”];
NSURL *urlContents = [myURL resourceDataUsingCache:YES];
if ([urlContents writeToFile:[@”~/Documents/applewebsite.html”
stringByExpandingTildeInPath]
atomically:YES])
{
// It was successful, do stuff here
} else {
// There was a problem writing the file
}
What will you do to accomplish the task?
You work as a Network administrator for Infonet Inc. The company has 135 Windows XP
Professional computers and twenty Windows 2003 Server computers. You want to specify the
number of invalid logon attempts allowed before a user account is locked out. What will you do to
accomplish the task?