Which Linux command will securely delete a file by overwriting its contents?
Which Linux command will securely delete a file by overwriting its contents?
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
Which of the following BCP teams is the first responder and deals with the immediate effects of
the disaster?
Which digital signature has she chosen?
Shayla is designing a web-based application that will pass data to and from a company extranet.
This data is very sensitive and must be protected at all costs. Shayla will use a digital certificate
and a digital signature to protect the data. The digital signature she has chosen to use is based on
the difficulty in computing discrete logarithms. Which digital signature has she chosen?
What is this called?
You are responsible for network and information security at a large hospital. It is a significant
concern that any change to any patient record can be easily traced back to the person who made
that change. What is this called?
Which of the following response teams aims to foster cooperation and coordination in incident prevention…
Which of the following response teams aims to foster cooperation and coordination in incident
prevention, to prompt rapid reaction to incidents, and to promote information sharing among
members and the community at large?
What is George preventing by changing the code?
After learning from an external auditor that his code was susceptible to attack, George decided to
rewrite some of his code to look like the following. What is George preventing by changing the
code?
public voif doContent(…) {
…
String s;
if ((s = getUsernameByID(“userid”)) != null) {
s = StringUtils.encodeToHTML(s, 50);
response.write(“<br>Applicant:<u>” + s +
“</u>”);
}
…
}
Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software
Which of the following types of attacks occurs when an attacker successfully inserts an
intermediary software or program between two communicating hosts?
what port must he have the network engineer open in order for the application to communicate?
Fred is planning on using the windows socket application ClientApp.exe program to create a
client-side application that his employees will use. This program will access backend programs
from two different remote sites over WAN connections. If Fred does not make any modifications to
the ClientApp.exe default settings, what port must he have the network engineer open in order for
the application to communicate?
Which of the following statements best describes the difference between the role of a data owner and the role
Which of the following statements best describes the difference between the role of a data owner
and the role of a data custodian?
What would be the result of the following code?
What would be the result of the following code?
#include <stdio.h>
#include <stdlib.h>
int main(int argc, char *argv[])
{
char *input=malloc(20);
char *output=malloc(20);
strcpy(output, “normal output”);
strcpy(input, argv[1]);
printf(“input at %p: %s\n”, input, input);
printf(“output at %p: %s\n”, output, output);
printf(“\n\n%s\n”, output);
}