What feature of the BlueFire software will be able to accomplish this?
Jacob just purchased the BlueFire Mobile Security Enterprise software package for all his
company’s mobile devices. Jacob wants to configure the software so that it will quarantine a
device by blocking all incoming and outgoing network communication if a breach or violation has
occurred. What feature of the BlueFire software will be able to accomplish this?
What type of RPC authentication can Simon use for this application?
Simon is writing an application that will use RPC to talk between a client and server. He will use
authentication, but in his application the server does not have to know the RPC caller’s identity.
What type of RPC authentication can Simon use for this application?
What two encryption methods are used by the Secure Electronic Transaction system?
What two encryption methods are used by the Secure Electronic Transaction system?
Why would Kevin choose to employ HTML Guardian to hide the source code of his webpage?
Kevin is developing a webpage using html and javascript code. The webpage will have a lot of
important content and will have a number of functions that Kevin does not want revealed through
the source code. Why would Kevin choose to employ HTML Guardian to hide the source code of
his webpage?
What ports should Clay tell the network team to close off at the firewall to disallow all incoming and outgoin
Clay is a SQL dba working for Integrated Solutions Inc., a graphics design company in Miami. Clay
administers 10 SQL servers at the company’s headquarters. Clay wants to ensure that all SQL
traffic stays within the internal network and no SQL traffic from the outside can get into the internal
network. What ports should Clay tell the network team to close off at the firewall to disallow all
incoming and outgoing SQL traffic?
What issue did Simon find in the following code?
Simon is going through some of Heather’s code and notices an issue. What issue did Simon find
in the following code?
void f4(void * arg, size_t len)
{
char *buff = new char[100];
C *ptr = new C;
memcpy(buff, arg, len);
ptr->vf();
return;
}
What vulnerability or issue is the code susceptible to?
Lori is creating a login page using Java on one of her websites with the following code. What
vulnerability or issue is the code susceptible to?
conn = pool.getConnection();
String sql = “select * from user where
username=’” + “’ and password=’” + password +
“’”;
stmt = conn.createstatement();
rs = stmt.executeQuery(sql);
if (rs.next())
{
loggedIn = true;
out.println(“Successfully logged in”);
}
else
{
out.println(“Username and/or password not valid”);
}
What is Malory trying to prevent here?
Malory is creating a webpage in PHP where users will have to logon to gain access to certain
areas of the site. Malory is concerned that malicious users might try to exploit her site, so she
decides to use the following code to prevent some attacks. What is Malory trying to prevent here?
$username = addslashes($_POST[“username”]);
$password = addslashes($_POST[“password”]);
What type of testing is Tyler getting ready to perform?
Tyler is in the applicaion testing phase of a particular project. He has decided to use the White Box
testing method. Tyler has made a number of changes to his code after some initial tests found
some bugs. Tyler now needs to test the code with those changes in place.
What type of testing is Tyler getting ready to perform?
Which SATSA security package should Julie use if she needs to support basic user-certificate management?
Julie wants to use some of the Security and Trust Services API’s for a program she is writing that
will work with mobile devices. Which SATSA security package should Julie use if she needs to
support basic user-certificate management?