Paul wants to capture audit information on PLSQL so he executes the following command:
sqlplus "sys / as sysdba"
Enter password: password123!!!!
SQL> ALTER SYSTEM SET AUDIT_TRAIL = OS
SCOPE=SPFILE;
SQL> SHUTDOWN NORMAL;
SQL> STARTUP;
What privileges has Paul logged on with?
A. ADMIN
B. Root
C. SYSDBA
D. SYS
George is writing an application in Java and is using DES in the code to implement the encryption and decryption of data that will be passed. In the following code snippet, what will be accomplished?
FileOutputStream out = newFileOutputStream
(f);
out.write(rawkey);
A. Convert the secret key to an array of bytes
B. Generate a secret TripleDES encryption key
C. Writes the raw key to a file
D. Send the raw key to a decryption output array
Clay is a SQL dba working for Integrated Solutions Inc., a graphics design company in Miami. Clay administers 10 SQL servers at the company's headquarters. Clay wants to ensure that all SQL traffic stays within the internal network and no SQL traffic from the outside can get into the internal network.
What ports should Clay tell the network team to close off at the firewall to disallow all incoming and outgoing SQL traffic?
A. 1499
B. 1433
C. 389
D. 1434
Kevin wants to use an SSL certificate from his Mac OS X server so that he can send and receive encrypted email. What would Kevin accomplish by typing in the following command? certtool c k=/Users/root/Library/Keychains/certkc
A. Remove any unnecessary permissions on the file "certkc"
B. Create keychain called "certkc"
C. Copy the root certificate of the server to the file "certkc"
D. Import encryption key into the file "certkc"
Fred has just finished developing a number of ASP pages that will be posted to his company's website. Fred does not want the page's source code viewed by anyone, so he decided to encode the pages to make the source code unusable.
What will the following command accomplish?
screnc /e asp *.* c:\tmp
A. Create an MD5 hash for all ASP files in the c:\tmp directory
B. Encode all ASP files in current directory as ASP files and place them in the c:\tmpdirectory
C. Encode all ASP files and place them in the c:\tmp directory
D. Encode all ASP files in in the c:\tmp and place them in the default IIS virtual directory
What type of problem or error will result from the following statement?
void f2b(void * arg, size_t len)
{
char buffer[100];
long val = ...;
long *ptr = ...;
extern void (*f)();
memcpy(buff, arg, len);
*ptr = val;
f();
return;
}
A. Pointer subterfuge
B. Heap smashing
C. Virtual pointer smashing
D. Sign error
Gloria is the lead operation manager for a movie production company in Las Vegas. She has been asked with ensuring that the new movie created by the company will fit on one side of a DVD disk that will be sold to the public. If the movie mentioned is a full-length production and must fit on one side of the disk, what level of compression must Gloria use?
A. 100 Mb/s
B. 10.5 Mb/s
C. 3.8 Mb/s
D. 7.2 Mb/s
What compression library is used by wiretap, the packet analyzer reader for Wireshark?
A. wtapbil
B. pclib
C. winrar
D. zllib
What is one of the dominant factors that lead to insecure programming?
A. No companies currently teach developers how to create secure programs
B. Secure programming is not seen as a priority by any corporation
C. Security is not usually a skill possesed by programmers or developers
D. Secure programming is seen as too costly and time consuming by corporations
What encryption algorithm is used by PERL crypt() function?
A. Skipjack
B. 3DES
C. DES
D. AES