1.
What security package is implemented with the following code? dwStatus = DsMakSpn
( ldap,
MyServer.Mydomain.com,
NULL,
0,
NULL,
&pcSpnLength,
pszSpn
);
rpcStatus = RpcServerRegisterAuthInfo
(
psz
RPC_C_AUTHN_GSS_NEGOTIATE,
NULL,
NULL
);
2.
Steve is using the libcap library to create scripts for capturing and analyzing network traffic. Steve has never used libcap before and is struggling with finding out the correct functions to use. Steve is trying to pick the default network interface in his script and does not know which function to use. Which function would he use to correctly choose the default interface in the script?
3.
Processes having the CAP_NET_BIND_SERVICE can listen on which ports?
4.
David is an applications developer working for Dewer and Sons law firm in Los Angeles David just completed a course on writing secure code and was enlightened by all the intricacies of how code must be rewritten many times to ensure its security. David decides to go through all the applications he has written and change them to be more secure. David comes across the following snippet in one of his programs:
#include
int main(int argc, char **argv)
{
int number = 5;
printf(argv[1]);
putchar(\n);
printf(number (%p) is equal to %d\n,
&value, value);
}
What could David change, add, or delete to make this code more secure?
5.
Which Linux command will securely delete a file by overwriting its contents?
6.
Shayla is designing a web-based application that will pass data to and from a company extranet. This data is very sensitive and must be protected at all costs. Shayla will use a digital certificate and a digital signature to protect the data. The digital signature she has chosen to use is based on the difficulty in computing discrete logarithms. Which digital signature has she chosen?
7.
After learning from an external auditor that his code was susceptible to attack, George decided to rewrite some of his code to look like the following. What is George preventing by changing the code? public voif doContent (...) { ... String s;
if ((s = getUsernameByID(userid)) != null) { s = StringUtils.encodeToHTML(s, 50); response.write( Applicant: + s + );
}
...
}
8.
Fred is planning on using the windows socket application ClientApp.exe program to create a client- side application that his employees will use. This program will access backend programs from two different remote sites over WAN connections. If Fred does not make any modifications to the ClientApp.exe default settings, what port must he have the network engineer open in order for the application to communicate?