Harold is programming an application that needs to be incorporate data encryption. Harold decides to utilize an encryption algorithm that uses 4-bit working registers instead of the usual 2-bit working registers. What encryption algorithm has Harold decided to use?
Answer : D
What security package is implemented with the following code? dwStatus = DsMakSpn ldap,
MyServer.Mydomain.com,
NULL,
0,
NULL,
&pcSpnLength,
pszSpn
);
rpcStatus = RpcServerRegisterAuthInfo
psz
RPC_C_AUTHN_GSS_NEGOTIATE,
NULL,
NULL -
);
Answer : A
Steve is using the libcap library to create scripts for capturing and analyzing network traffic.
Steve has never used libcap before and is struggling with finding out the correct functions to use. Steve is trying to pick the default network interface in his script and does not know which function to use. Which function would he use to correctly choose the default interface in the script?
Answer : C
Processes having the “CAP_NET_BIND_SERVICE” can listen on which ports?
Answer : C
David is an applications developer working for Dewer and Sons law firm in Los Angeles
David just completed a course on writing secure code and was enlightened by all the intricacies of how code must be rewritten many times to ensure its security. David decides to go through all the applications he has written and change them to be more secure. David comes across the following snippet in one of his programs:
#include <stdio.h>
int main(int argc, char **argv)
int number = 5;
printf(argv[1]);
putchar(\n);
printf(number (%p) is equal to %d\n,
&value, value);
What could David change, add, or delete to make this code more secure?
Answer : B