when creating applications for clients?
William is the lead programmer for Gummerson, Inc., a software company located in San
Francisco. Gummerson is looked upon as one of the leading software development companies for
medical and health related applications. William believes that his company is so successful
because they believe in involving the user or client in the design and development of the
programs. What software development methodology does Gunnerson, Inc. use when creating
applications for clients?
Which of the following tools will you use to accomplish the task?
You want to use PGP files for steganography. Which of the following tools will you use to
accomplish the task?
What level of J2ME security should Harold implement to accomplish this?
Harold is writing a J2ME program that run an inventory application on his company’s PDAs.
Employees will use their PDA to scan barcodes into the program Harold is writing. Harold is very
concerned about securing his program’s code and ensuring its integrity once it is utilized. Harold
particularly wants to stop the execution of class files loaded in the virtual machine in any way,
what is not allowed by java virtual machine specification. What level of J2ME security should
Harold implement to accomplish this?
Fill in the blank: A ___________plan is a plan devised for a specific situation when things could go wrong
Fill in the blank:
A ___________plan is a plan devised for a specific situation when things could go wrong.
What authority must Harold have to run the TO_DATA_LABEL function?
Harold is creating an Oracle Label Security Policy on his server. He has define the policy and
defined the components of the labels already. Now Harold creates the labels dynamically using
the TO_DATA_LABEL function:
INSERT INTO emp (ename, empnum, hr_label)
VALUES (‘FGRIFFIN’, 10 to_data_label (‘HR’, ‘SENSITIVE’));
Harold gets an error reffering to permission when he tries to run this function. What authority must
Harold have to run the TO_DATA_LABEL function?
which one of the following is an output of risk monitoring and control?
You are working as a Project Manager in your organization. You are nearing the final stages of
project execution, and looking towards the final risk monitoring and controlling activities. For your
project archives, which one of the following is an output of risk monitoring and control?
What tool included in Valgrind suite can Yancey use to detect memory-management related issues?
Yancey has just finished downloading the Valgrind suite to use in his application development.
Yancey is most concerned about the possibility of memory-management issues in his programs.
What tool included in Valgrind suite can Yancey use to detect memory-management related
issues?
Which SDLC phase meets the following audit objectives?
Software Development Life Cycle (SDLC) is a logical process used by the programmers to
develop software. Which SDLC phase meets the following audit objectives?
System and data are validated.
System meets all user requirements.
System meets all control requirements.
what would the script be vulnerable to?
If a developer wrote the following code, what would the script be vulnerable to?
#include <stdio.h>
int main(int argc, char **argv)
{
int number = 5;
printf(argv[1]);
putchar(‘\n’);
printf(“number (%p) is equal to %d\n”, &value, value);
}
What will Mark do to improve the disaster recovery plan?
Mark works as a Network Administrator for NetTech Inc. Mark is testing the disaster recovery plan
of the company. During the testing of the recovery plan, he finds that some servers have been
restored with another server’s data. What will Mark do to improve the disaster recovery plan?