Harold is programming an application that needs to be incorporate data encryption. Harold decides to utilize an encryption algorithm that uses 4-bit working registers instead of the usual 2- bit working registers. What encryption algorithm has Harold decided to use?
A. Blowfish
B. RC5
C. RC4
D. RC6
Shayla is designing a web-based application that will pass data to and from a company extranet. This data is very sensitive and must be protected at all costs. Shayla will use a digital certificate and a digital signature to protect the data. The digital signature she has chosen to use is based on the difficulty in computing discrete logarithms.
Which digital signature has she chosen?
A. Rabin
B. Diffie-Hellman
C. SA-PSS
D. ElGamal
What is the new lightweight audit framework that is built into Red Hat Linux Enterprise?
A. HelperReview
B. Audit2
C. SOCK review
D. RedHat review
George is the CIO for the US Department of Defense. George's education and work experience cover everything from Systems Administration to developing complex software programs for the government. With many new federal regulations put forth by the US Department of Homeland Security, every single aspect of George's control must be secured and protected from attack. George is currently looking to purchase customized communications software for sending instant messages to branches of the DoD all over the world.
What set of security standards should George ensure the software he purchases be developed under?
A. Common Criteria
B. ISO 199776
C. Code Containment
D. Code Access Security
What will the following script accomplish?
for (int i=0; i if (HttpCookie.domainMatches(blacklist[i], host)) return false; A. Create a list of blacklist domains B. Check domains against a blacklist C. Prevent site from being blacklisted D. Delete entries in a blacklist file
Simon is going through some of Heather's code and notices an issue. What issue did Simon find in the following code?
void f4(void * arg, size_t len)
{
char *buff = new char[100];
C *ptr = new C;
memcpy(buff, arg, len);
ptr->vf();
return;
}
A. Function pointer clobbering
B. Null-termination
C. Data pointer modification
D. Virtual pointer smashing
Malory is creating a webpage in PHP where users will have to logon to gain access to certain areas of the site. Malory is concerned that malicious users might try to exploit her site, so she decides to use the following code to prevent some
attacks.
What is Malory trying to prevent here?
$username = addslashes($_POST["username"]);
$password = addslashes($_POST["password"]);
A. SQL injection
B. CSS attack
C. Reflected mode XSS attack
D. CSRF attack
What functionality of the Oracle Identity Management system facilitates real-time integration of multiple directories and user repositories through a single LDAP service?
A. Access and Identity
B. Virtual directory
C. Federation
D. Provisioning