1.
David is a developer that has created an application using the secure RPC protocol. Before anyone can actually use the program, where must David add entries for the users so that they can gain access?
2.
Jayson is the head developer of a team working on an inventory tracking and maintenance program. Jayson and his team are in the third phase of the software development life cycle, designing the program. In their current development phase, what material would be considered the input for their program?
3.
What is the new lightweight audit framework that is built into Red Hat Linux Enterprise?
4.
Sherry is programming an online game and is trying to prevent security threats from being introduced into the game. She is also trying to prevent any kind of online cheating by searching for possible anomalies. Sherry especially wants to prevent cheating where a program or application is used to replace human reaction to produce superior results. What category of online cheating is she most concerned about?
5.
What programming threat model with six categories includes repudiation, spoofing identity, information disclosure and so on?
6.
Jay is using the EnTrial Key Generator software to create software keys for the programs he has created. To create the unlock key in the software, what two inputs must Jay use?
7.
George is the CIO for the US Department of Defense. George's education and work experience cover everything from Systems Administration to developing complex software programs for the government. With many new federal regulations put forth by the US Department of Homeland Security, every single aspect of Georges control must be secured and protected from attack. George is currently looking to purchase customized communications software for sending instant messages to branches of the DoD all over the world. What set of security standards should George ensure the software he purchases be developed under?
8.
Mathew is working on a Fedora machine and is having issues with some shellcode he wrote that is producing errors. Mathew decides to download and use Ktrace to debug the shellcode to see where the errors are originating from. Why will his plan not work?
9.
Neil is almost finished developing a Web-based inventorytracking application for a company he is working for under contract. Neil finds out that the company wants to pay him half of what they had agreed upon so he is very angry. Neil decides to insert the following code into his application. What is Neil trying to create here?
#include
#include
int main(int argc, char *argv[])
{
char buffer[10];
Complete collection of 312-92 Exams Question and answers.
http://www.ExamsKey.com
if (argc < 2)
{
fprintf(stderr, USAGE: %s
string\n, argv[0]);
return 1;
}
strcpy(buffer, argv[1]);
return 0;
}
10.
What type of error will result from the following statement? int main(int argc, char* argv[])
{
char i[7];
strncpy(i, sdfusdofof, sizeof(i));
}