exam review
List three logical operators used in C programming.
(AND, OR, and NOT)
Name two looping mechanisms used in Perl.
(for loop, while loop)
Which of the following tags enables an HTML programmer to create a loop? 1. <loop> 2. <nest> 3. <while> 4. HTML doesn't have a looping function or tag
4. HTML doesn't have a looping function or tag
Which Win API function returns the NetBIOS computer name? A. NodeName ( ) B. GetOSName ( ) C. DomainName ( ) D. LoginName ( )
A. NodeName ( )
An English-like language you can use to help create the structure of your program is known as which of the following? A. pseudocode B. assembly language C. syntax D. machine code
A. pseudocode
True or False: Branching takes you from one area of a program (a function) to another area. a. True b. False?
Answer: True
Instead of grammatical errors, programmers must deal with what type of errors?
Answer: syntax
A C program must contain which of the following? A. Name of the computer programmer B. A main() function C. The #include header file D. A description of the algorithm used
B. A main() function
What programming term is used to describe the act of performing a task over and over? A. branching B. looping C. testing D. documentation
B. looping
Which Perl operator is used to perform the exponent function? A. % B.! C. ** D. -
C. **
In object-oriented programming, what are the structures that hold pieces of data and functions called? A. domains B. components C. classes D. shells
C. classes
Which Perl command gives you a list of parameters used with the perl command? A. perl -p B. perl ? C. perl -P D. perl -h
D. perl -h
____ is the process of converting the ciphertext message back into plaintext so that it can be readily understood.
Decryption
____ is the process of converting an original message into a form that is unreadable to unauthorized individuals − that is, to anyone without the tools to convert the encrypted message back to its original format.
Encryption
____ are hardware devices or software modules that perform encryption to secure data, perform authentication to make sure the host requesting the data is an approved user of the VPN, and perform encapsulation to protect the integrity of the information being sent.
End points
___ is the process of attracting attention to a system by placing tantalizing information in key locations.
Enticement
____ is the act of luring an individual into committing a crime to get a conviction.
Entrapment
____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.
Hash algorithms
____ are decoy systems designed to lure potential attackers away from critical systems.
Honeypots
____ encompasses the actions an organization takes when an intrusion is detected.
Incident response
____ is the principle by which members of the organization are allowed to access the minimal amount of information for the minimal amount of time necessary to perform their required duties.
Least privilege
___ is the process of providing a nonsecret, random piece of data to the hashing function when the hash is first calculated.
Salting
____ is the process of replacing plaintext values with other values to form ciphertext.
Substitution
True or False: Perl is the next language of choice after C, for both hackers and security professionals.
True
____ is the process of adjusting an IDPS to maximize its efficiency in detecting true positives while minimizing both false positives and false negatives.
Tuning
Documentation of a program should include which of the following? (Choose all that apply.) a. Author b. Date written c. Explanation of complex algorithms d. Modifications to the code
a. Author b. Date written c. Explanation of complex algorithms d. Modifications to the code
Most programming languages enable programmers to perform which of the following actions? (Choose all that apply.) a. Branching b. Testing c. Faulting d. Looping
a. Branching b. Testing d. Looping
Before writing a program, many programmers outline it first by using which of the following? a. Pseudocode b. Machine code c. Assembly code d. Assembler code
a. Pseudocode
. In object-oriented programming, classes are defined as the structures that hold data and functions. a. True b. False?
a. True
Perl and C are the most widely used programming languages among security professionals. a. True b. False?
a. True
What are the three looping mechanisms in C? (Choose all that apply.) a. for loop b. while loop c. if-then-else loop d. do loop
a. for loop b. while loop d. do loop
A(n) ____ is the programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represents the message.
algorithm
In ____, the higher-order protocols (HTTP, FTP, Telnet) are examined for unexpected packet behavior or improper use.
application protocol verification
HTML files must be compiled before users can see the resulting Web pages. a. True b. False?
b. False?
Which of the following is the Win32 API function for verifying the file system on a Windows computer? a. Filesystem() b. FsType() c. System() d. IsNT()
b. FsType()
Which of the following HTML tags is used to create a hyperlink to a remote Web site? a.<a href=http://url> b.<a href="http://url> c.<a href=File:///c:filename> d.<a href/>
b.<a href="http://url>
A(n) ____ tries every possible character, number, and symbol combination to guess the password.
brute-force attack
To add comments to a Perl script, you use which of the following symbols? a. // b. /* c. # d. <!--
c. #
A missing parenthesis or brace might cause a C compiler to return which of the following? a. System fault b. Interpreter error c. Syntax error d. Machine-language fault
c. Syntax error
. In C, which looping function performs an action first and then tests to see whether the action should continue to occur? a. for loop b. while loop c. do loop d. unless loop
c. do loop
What is the result of running the following C program? main() { int a=2; if (a=1) printf("I made a Mistake!"); else printf(" I did it correctly"); } a. "Syntax error: illegal use of;" is displayed. b. "I made a mistake!" is displayed. c. "Syntax error: variable not declared" is displayed. d. "I did it correctly!" is displayed.
d. "I did it correctly!" is displayed.
Using the following Perl code, how many times will "This is easy..." be displayed onscreen? for ( $count=1 ; $count <=5 ; $count++) { print "This is easy!!" } a. 6 b. 4 c. None (syntax error) d. 5
d. 5
An algorithm is defined as which of the following? a. A list of possible solutions for solving a problem b. A method for automating a manual process c. A program is written in a high-level language d. A set of instructions for solving a specific problem
d. A set of instructions for solving a specific problem
Which of the following C statements has the highest risk of creating an infinite loop? a. while (a > 10) b. while (a < 10) c. for (a = 1; a < 100; ++a) d. for (;;)
d. for (;;)
A mini program within a main program that carries out a task is known as which of the following? a. algorithm b. bug c. compile d. function
d. function
A(n) ____ throws every known word (sometimes in many languages) into the authentication system until something matches what's stored on the system.
dictionary attack
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) ____.
honeynet
A(n) ____ is basically an internal network restricted to employees within the organization, also using Internet technologies.
intranet
A(n) ____ occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system, almost always with the intent to do harm.
intrusion
The term ____ is used to describe a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest.
message authentication code (MAC)
The term ____ describes a database of precomputed hashes from sequentially calculated passwords
rainbow table
A(n) ____ is a plastic card with an embedded microchip that can store data about the owner.
smart card
A(n) ____ is a channel or pathway over a packet network used by the VPN; it runs through the Internet from one endpoint to another.
tunnel
A(n) ____ is an automatic phone-dialing program that dials every phone number in a configured range (e.g., from 555-1000 to 555-2000) and checks to see if a person, answering machine, or modem answers.
ward dialer