Wayne is a gaming software developer for a large video gaming company in Los Angeles. Wayne has just completed developing a new action/adventure game for the company that is to be released soon. To protect the company's copyright on the game, Wayne would like to incorporate a technology that will restrict the use of the digital files by controlling access, altering, sharing, copying, printing, and saving.
What technology does Wayne want to use?
A. ARM
B. WRM
C. DRM
D. Diffusion
Mathew is working on a Fedora machine and is having issues with some shellcode he wrote that is producing errors. Mathew decides to download and use Ktrace to debug the shellcode to see where the errors are originating from.
Why will his plan not work?
A. Ktrace cannot debug errors, it only notifies of successful calls
B. Ktrace only works on Windows platforms
C. Ktrace cannot debug shellcode
D. Ktrace only works on *BSD platforms
Simon is writing an application that will use RPC to talk between a client and server. He will use authentication, but in his application the server does not have to know the RPC caller's identity. What type of RPC authentication can Simon use for this application?
A. UNIX authentication
B. ANONYMOUS authentication
C. DES authentication
D. NULL authentication
What two encryption methods are used by the Secure Electronic Transaction system?
A. RSA
B. AES
C. DES
D. 3DES
Kevin is developing a webpage using html and javascript code. The webpage will have a lot of important content and will have a number of functions that Kevin does not want revealed through the source code. Why would Kevin choose to employ HTML Guardian to hide the source code of his webpage?
A. HTML Guardian disables the "view source" option when users browse to the page
B. HTML Guardian makes it so that nothing can be seen at all when viewing the source code
C. HTML Guardian wraps the code up into include files
D. HTML Guardian encrypts html and javascript code
Fred has just finished developing a number of ASP pages that will be posted to his company's website. Fred does not want the page's source code viewed by anyone, so he decided to encode the pages to make the source code unusable.
What will the following command accomplish?
screnc /e asp *.* c:\tmp
A. Create an MD5 hash for all ASP files in the c:\tmp directory
B. Encode all ASP files in current directory as ASP files and place them in the c:\tmpdirectory
C. Encode all ASP files and place them in the c:\tmp directory
D. Encode all ASP files in in the c:\tmp and place them in the default IIS virtual directory
What will the following SQL command accomplish? USE Accounting GO EXECUTE sp_grantdbaccess guest
A. Add guest user to the Accounting security group
B. Change default database for guest user to Accounting database
C. Add guest group to the Accounting database
D. Add guest user to the Accounting database
What is one of the dominant factors that lead to insecure programming?
A. No companies currently teach developers how to create secure programs
B. Secure programming is not seen as a priority by any corporation
C. Security is not usually a skill possesed by programmers or developers
D. Secure programming is seen as too costly and time consuming by corporations
Travis is writing a website in PHP but is worried about its inherent vulnerability from session hijacking. What function could Travis use to protect against session hijacking in his PHP code?
A. Renew_session_id
B. PHP_id_renew
C. Create_newsession_id
D. Session_regenerate_id
Victor has completed writing his software application and is now working on error messages that will be displayed in case of any kind of failure or problem. He has written code that will display a pop-up message where there is an error. He has also written code that explain the error that has occurred.
What is the last aspect of error messages that Victor needs to create for his application?
A. Display exact code in application where erroroccurred
B. Suggest solution
C. Shut down application so no damage canoccur
D. Fix error in application