Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fi
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee
for a fixed period of time in exchange for the disclosure of an invention?
What set of security standards should George ensure the software he purchases be developed under?
George is the CIO for the US Department of Defense. George’s education and work experience
cover everything from Systems Administration to developing complex software programs for the
government. With many new federal regulations put forth by the US Department of Homeland
Security, every single aspect of George’s control must be secured and protected from attack.
George is currently looking to purchase customized communications software for sending instant
messages to branches of the DoD all over the world.
What set of security standards should George ensure the software he purchases be developed
under?
Which of the following takes over when a ‘disaster’ situation occurs?
Availability Management deals with the day-to-day availability of services. Which of the following
takes over when a ‘disaster’ situation occurs?
Why will his plan not work?
Mathew is working on a Fedora machine and is having issues with some shellcode he wrote that is
producing errors. Mathew decides to download and use Ktrace to debug the shellcode to see
where the errors are originating from. Why will his plan not work?
Which of the following are the benefits of implementing IT Service Continuity Management?
IT Service Continuity Management (ITSCM) is used to support the overall Business Continuity
Management (BCM) in order to ensure that the required IT infrastructure and the IT service
provision are recovered within an agreed business time scales. Which of the following are the
benefits of implementing IT Service Continuity Management?
Each correct answer represents a complete solution. Choose all that apply.
What is Neil trying to create here?
Neil is almost finished developing a Web-based inventorytracking application for a company he is
working for under contract. Neil finds out that the company wants to pay him half of what they had
agreed upon so he is very angry. Neil decides to insert the following code into his application.
What is Neil trying to create here?
#include <stdio.h>
#include <string.h>
int main(int argc, char *argv[])
{
char buffer[10];
if (argc < 2)
{
fprintf(stderr, “USAGE: %s
string\n”, argv[0]);
return 1;
}
strcpy(buffer, argv[1]);
return 0;
}
Which of the following phases in the Incident handling process will utilize the signature to resolve this inci
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident
in the network of your company. You develop a signature based on the characteristics of the
detected virus. Which of the following phases in the Incident handling process will utilize the
signature to resolve this incident?
What type of error will result from the following statement?
What type of error will result from the following statement?
int main(int argc, char* argv[])
{
char i[7];
strncpy(i, “sdfusdofof”, sizeof(i));
}
Which of the following is established during the Business Impact Analysis by the owner of a process in accepte
Which of the following is established during the Business Impact Analysis by the owner of a
process in accepted business continuity planning methodology?
What Java security feature can Kyle use in the development of the site to add security?
Kyle is a web developer for Innovative Incorporated, a web development and graphics designing
company in Dallas. Kyle is currently working on a web-based application for a client that wants
dynamic and rich content on their site. Kyle is going to use java applets and flash animation to
make the website really stand out. The client was adamant though about making sure the site
used security features to ensure that the site itself and visitors alike would not have issues. What
Java security feature can Kyle use in the development of the site to add security?