Chapter 7, 10 and Encryption
(Encryption) A digital signature can provide each of the following benefits except ___________.
verify the receiver
(Chapter 10) What character shows that you are starting a block of code in the C and C++ languages? a. ~ b. ` c. { d. <
{
(Chapter 10) What started as a simple C program has now turned into several program modules as you have refined it over the past several months.The problem is that now you do not always remember which modules you have changed at what time. What should you do? a. Make the modification date part of the each program's name. b. Use the track( ) version tracking function. c. Use the C language file logging capability to track version changes. d. Use the make utility and create makefiles.
use the make utility and create makefiles
(Chapter 10) A daemon is a _____________. a. source code program for using the C compiler b. log file to track compiler errors c. specialized system process that runs in the background d. memory management process for automatically deleting unused swap space when a C++ program has ended
specialized system process that runs in the background
(Encryption) In order to ensure a secure cryptographic connection between web browser and web server a _________ digital certificates would be used.
server digital certificate
(Chapter 7) Which of the following are examples of Boolean operators used with the test command? (Choose all that apply.) a. -a for a logical AND b. -m for a partial MERGE c. -n for logical NEGATION d. -o for a logical OR
-a for a logical AND -o for a logical OR
(Chapter 7) When you enter echo $CLR your screen clears very quickly. Which of the following commands must you have entered previously to enable the use of echo $CLR to clear the screen? a. set =:clear b. let clear=CLR c. $clear=CLR d. CLR='clear'
CLR='clear'
(Encryption) An entity that issues digital certificates for others is a
Certificate Authority (CA)
(Chapter 7) When you enter test -d tmp ; echo $?, you see a 0 displayed on the screen.What does this mean? a. The tmp file is empty. b. The tmp file contains over 1 MB. c. The tmp directory exists. d. The tmp directory is empty.
The tmp directory exists.
(Chapter 10) Which of the following is an acceptable way to insert a comment line in a C++ program? (Choose all that apply.) a. // Program Name: calc.C b. # Program Name: calc.C c. rem Program Name: calc.C d. \ Program Name: calc.C
// Program Name calc.c
(Chapter 7) Your shell script, called .filetests, contains several functions used to run tests on files, such as to determine if a file is empty or has the correct permissions. Which of the following is/are true about .filetests? (Choose all that apply.) a. You can load the file's functions into memory by entering. .filetests. b. This is a hidden file. c. You can run the functions in the file by entering !. file tests. d. This is a character special file
a. You can load the file's functions into memory by entering. .filetests.b. This is a hidden file.
(Chapter 7) What symbol is typically used at the start and end of a flowchart? a. terminator b. display c. connector d. manual operation
a. terminator
(Encryption) Which of the following asymmetric cryptographic algorithms is the most secure?
RSA
(Encryption) Each of the following is a part of the certificate lifecycle except _______.
Authorization
(Chapter 7) Your company has assigned you to revise 22 scripts. Since you use the vi editor, how can you set it to automatically display lines as numbered so it is easier for you to work on these revisions? a. Create a vi macro that enables you view the lines as numbered when you press n in the command mode. b. Create the .exrc file in your home directory so this file contains the line: set number. c. Type set_lines and press Enter before you start vi. d. Press # while you are in the ex mode in vi.
Create the .exrc file in your home directory so this file contains the line: set number.
(Chapter 10) A colleague of yours is just learning to use the C compiler in Linux. When she tries to compile a program called firststart.c using gcc firststart.c she is expecting the executable file to have the name firststart, but there is no firststart file. What is the executable file's name? a. c.file b. a.out c. prog.o d. flie$.o
a.out
(Chapter 7) Which of the following characters are placed right after a function name when you create a shell function? a. ( ) b. !# c. [[ d. //
a. ( )
(Chapter 10) Which of the following are examples of data types in the C language? (Choose all that apply.) a. whole b. int c. double d. float
double int float
(Chapter 10) Which of the following are important characteristics of C++ programming? (Choose all that apply.) a. elimination of hexadecimal variables b. object-oriented programming c. use of classes for specialized programming needs d. designation of file size before opening a file
elimination of hexadecimal variables object-oriented programming
(Encyrption) Each of the following is an example of how hashing is used except _________.
encrypting and decrypting e-mail attachments
(Chapter 10) You have written a C program using the variables num, enum, sum, and long. When you compile the program you get an error message about using a variable the compiler finds unacceptable. Which of the following is likely to be the problem? a. These variables must be declared inside a function instead of at the beginning of the program code. b. C does not allow you to declare more than three variables. c. enum and long are keywords and cannot be used as variables. d. Variables must be declared in alphabetic order, but you have used the order num, enum, sum, and long.
enum and long are keywords and cannot be used as variables.
(Chapter 10) Which of the following functions must be in a C program? a. tart.io( ) b. main( ) c. run( ) d. absolute( )
main()
(Encryption) Proving that a user sent an email message is known as _________.
non-repudiation
(Encryption) Data that is to be encrypted by inputting into an algorithm is called ___________.
plaintext
(Chapter 7) Which of the following are examples of symbols you might use in a flowchart? (Choose all that apply.) a. decision b. document c. data d. magnetic disk
a. decision b. document c. data d. magnetic disk
(Chapter 10) Your C++ program needs to access the system date in different ways. Which of the following enables you to do this? a. time.d b. <ctime> library c. const time subroutine d. time( )
<ctime> library
(Chapter 10) What compiler is started by using the g++ command? a. the C++ compiler b. the preprocessor compiler c. the object and binary linker compiler d. the C compiler
the C++ Compiler
(Encryption) A digital certificate associates __________.
the user's identity with his public key
(Encryption) Digital certificates can be used for each of the following except __________.
to verify the authenticity of the Registration Authorize
(Chapter 10) Which of the following is the right way to use the string constant, Enter your ID:, in the C language? a. ~ Enter your ID:~ b. \ Enter your ID: c. >> Enter your ID: d. "Enter your ID:"
"Enter your ID:"
Which of the following is the strongest symmetric cryptographic algorithm?
Advanced Encryption Standard
(Chapter 10) Your program to calculate values in physics requires working with positive and negative whole numbers between -14,242 and 12,528. What data types would you use to work with these numbers in a C program? a. unsigned short b. char c. short int d. signed whole
short int
(Encryption) Each of the following is a basic security protection over information that cryptography can provide except ___________.
stop loss
(Chapter 7) Which of the following statements enables you to determine if the variable, called value, is less than 750? a. echo $value -l 750 b. comm value$ to 750 c. test $value - lt 750 d. test "value" >! 750
test $value - lt 750
(Chapter 7) Some Linux systems use the script to perform the same actions each time a user logs out of her account. a. .bash_logout b. .bash_rc c. /bin/bashout d. /etc/logoff_bash
.bash_logout
(Chapter 10) Which of the following functions is used to open a file in the C language? a. file.o( ) b. scan( ) c. fopen( ) d. void( )
fopen()
(Chapter 10) What are three examples of looping logic structures that can be used in the C language?
for loops, while loops, and do while loops
(Encyrption) A digital certificate that turns the address bar green is a ______.
Extended Validation SSL
(Chapter 10) The programmer you are training wants to write code to determine when the end of a file has been reached. Which of the following can he use? a. putc b. feof( ) c. end( ) d. filemarker
feof ()
(Chapter 10) Name a function that enables you to read the contents of a file and another function that enables you to write to the file in the C language
fopen()
(Encyrption) When Bob wants to send a secure message to Alice using an asymmetric cryptographically algorithm, which key does he use to encrypt the message?
Alice's Public Key
(Chapter 10) Which of the following are performed by functions in the C library? (Choose all that apply.) a. screen operations b. memory allocation operations c. file operations d. math operations
All of them. screen operations memory allocation operations file operations math operations
(Chapter 10) What is an automatic variable?
An automatic variable is a variable declared inside a function and local to the function in which it is declared.
(Encryption) A list of approved digital certificates it's called a
Certificate Repository (CR)
(Encryption) What is the cryptographic transport protocol that is used most often to secure web transactions?
HTTPS
(Encryption) Which of the following is a protection provided by hashing?
Integrity
You use the same five shell functions every day and are looking for a way to ensure they are available as soon as you log into your account. What can you do? a. Make them residual system variables. b. Make them permanent environment variables. c. Load them via your login script. d. Make them permanent functions by adding them to the /func directory.
Load them via your login script.
(Chapter 7) You have recently met with your company's budget committee about creating a script to for producing the same budget reports at the end of each month. Because this is an important undertaking you've started by creating a flowchart. What step should you take next? a. Immediately write the functions you'll need for the script. b. Create a menu script. c. Find the three most important fields in the Budget file that you can use as keys d. Write pseudocode before you create the actual script
Write pseudocode before you create the actual script
(Chapter 10) You've written a C program, but are now getting an error message about the use of standard input and output statements when you compile the program. Which of the following might be the cause? a. You omitted the preprocessor directive for the file stdio.h. b. You forgot to declare the print I/0 as a char data type. c. Your computer is not configured to use I/0. d. You did not specify an object file for your program.
You omitted the preprocessor directive for the file stdio.h.
(Chapter 7) When working on the script in Question 15, which of the following should you consider? a. output strength b. input validation c. functional reciprocation d. user vacillation
b. input validation
(Chapter 7) The script you are creating takes data input to use for updating a file. Before taking the data input, you want the script to verify that the file to be updated, called clients, exists and that the script user has permission to write to that file. Which of the following statements enables you to do this? a. string -w clients b. test -w clients c. chmod -all clients d. tr -ew clients
b. test -w clients
(Chapter 10) Which of the following is in the proper format for a character constant? a. C! b. <c> c. 'C' d. 'c'
c and d. ('C' and 'c')
(Chapter 7) In which of the following files would a system administrator set the default shell used by your account? a. .shell b. /home/shell c. /etc/passwd d. /home
c. /etc/passwd
(Chapter 7) You have a specialized data file, called customers, in which the fields in the file are separated by the character ^. You want to view this file with a colon between the fields before you convert it to remove the ^ characters and insert colons. Which of the following commands enables you to view the file in this way? a. insert -t : ^ | customers b. test - i [^] [:] customers c. cat customers | tr "^" ":" d. sub ':' '^' > customers
cat customers | tr "^" ":"
(Chapter 10) In your C program, you want to use a while loop and decrement the value, counter, each time the program goes through the while loop.Which of the following operators enables you to decrement the value in counter? a. counter #-1; b. dec01 counter; c. ++counter; d. counter--;
counter--;
(Chapter 10) Which of the following statements enables you to print File updated. on the screen when a C++ program is finished? a. cout << "File updated.\n"; b. cout >> File updated./n c. scanf ~File updated. d. scanf >> File updated.\n;
cout << "File updated.\n";
(Chapter 7) Each month your business manually deletes specific records for employees who have left the company. You have been asked to write a script to automate this process. Which of the following commands works well for deleting records in a file? a. cut -a b. purge -d c. trdel -r d. sed -d
d. sed -d
(Encryption) A _________ is never intended to be decrypted but is only used for comparison purposes
digest
(Chapter 7) Which of the following script statements accomplishes the same thing as the statement: while [ "$part" != "alternator" ] ; do ? (Choose all that apply.) a. while $part "alternator" ; do b. while test $part != "alternator" ; do c. for test $part > "alternator" ; do d. test $part -eq "alternator" | do
b. while test $part != "alternator" ; do
(Chapter 7) When you create a shell function from the command line, what character do you enter at the first > prompt just after you declare the function's name? a. " b. { c. ' d. $
b. {
(Chapter 7) You have been asked to write a script for use by the faculty at the engineering school at your college.The script you write uses the Bash shell, but some faculty members often use a different shell in their work. How can you best ensure that the Bash shell is invoked when this script is run? a. Have the script print a warning to the screen that it requires the Bash shell. b. Have the system administrator adjust all faculty accounts so the Bash shell is the default. c. Enter the line # !/ bin/bash as the first line in the script. d. Create a function for all faculty user accounts that prevents use of shells other than Bash.
c. Enter the line # !/ bin/bash as the first line in the script.
(Encryption) The strongest technology that would assure Alice and Bob is the sender of a message is a _________.
digital certificate
(Encryption) Symmetric cryptography algorithms are also called ____________.
private key cryptography
(Chapter 7) 8. What does a down arrow represent in a flowchart? a. process flow b. manual input c. stored data d. display
process flow