1.
What will the following ASP script accomplish on a webpage? <%
Response.CacheControl = no-cache
Response.AddHeader Pragma, no-cache
Response.Expires = -1
if session(UID)= then
Response.Redirect Logon.asp
Response.End
end if
%>
2.
Heather has built a new Linux kernel for her machine and wants to use the grub boot loader. Which file should she edit to tell the computer how to boot up properly?
3.
Jonathan is creating an XML document and needs to sign data streams. In his code, Jonathan creates a signature node that is contained within the signed datastream. What type of signature signing has Jonathan employed here?
4.
Victor is creating an online shopping cart for his company that will accept credit cards as payment. What protocol that provides open encryption and security specifications designed to protect credit card transactions should Victor use?
5.
What function can be used with SQL to encrypt user suppliedpasswords so that they can be compared with the encrypted passwords stored on the SQL server?
6.
Carl just purchased an expensive smart phone to use for personal and business use. Carl wants to protect his investment so he decides to register the unique GSM number of the phone in case it is ever stolen. Which number should he have registered?
7.
Paul wants to capture audit information on PLSQL so he executes the following command:
sqlplus sys / as sysdba
Enter password: password123!!!!
SQL> ALTER SYSTEM SET AUDIT_TRAIL = OS
SCOPE=SPFILE;
SQL> SHUTDOWN NORMAL;
SQL> STARTUP;
What privileges has Paul logged on with?
8.
George is writing an application in Java and is using DES in the code to implement the encryption and decryption of data that will be passed. In the following code snippet, what will be accomplished?
FileOutputStream out = newFileOutputStream
(f);
out.write(rawkey);
9.
Charles is writing a script in PERL for a website he is working on. The only problem he is having is that part of his script needs to call a file that a normal user does not have permission to access. What PERL command could Charles use to elevate the current user's permission so that the file could be called?
10.
Devon is writing the following code to avoid what?