Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You work as a Software Developer for Mansoft Inc. You create an application and use it to create users as members of the local Users group. Which of the following code snippets imperatively demands that the current user is a member of the local Users group?

A.

System.AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal); PrincipalPermission MyPermission = new PrincipalPermission(null, @"BUILTIN\Users", true); MyPermission.Demand();

B.

PrincipalPermission MyPermission = new PrincipalPermission(null, @"BUILTIN\Users", true); MyPermission.Demand();

C.

System.AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal); PrincipalPermission MyPermission = new PrincipalPermission(null, @"Users", true); MyPermission.Demand();

D.

PrincipalPermission MyPermission = new PrincipalPermission(null, @"Users", true); MyPermission.Demand();

Which of the following commands can you use to search a string 'pwd' in all text files without opening them? (Choose two)

A.

vi

B.

grep

C.

sed

D.

locate

Which of the following key combinations in the vi editor is used to copy the current line?

A.

dk

B.

yy

C.

d$

D.

dl

Data mining is a process of sorting through data to identify patterns and establish relationships. Which of the following data mining parameters looks for patterns where one event is connected to another event?

A.

Sequence or path analysis

B.

Forecasting

C.

Clustering

D.

Association

Which of the following are the limitations for the cross site request forgery (CSRF) attack?

A.

The attacker must determine the right values for all the form inputs.

B.

The attacker must target a site that doesn't check the referrer header.

C.

The target site should have limited lifetime authentication cookies.

D.

The target site should authenticate in GET and POST parameters, not only cookies.

Which of the following statements is true about residual risks?

A.

It is the probabilistic risk after implementing all security measures.

B.

It can be considered as an indicator of threats coupled with vulnerability.

C.

It is a weakness or lack of safeguard that can be exploited by a threat.

D.

It is the probabilistic risk before implementing all security measures.

Which of the following are the drawbacks of the NTLM Web authentication scheme?

A.

The password is sent in hashed format to the Web server.

B.

It works only with Microsoft Internet Explorer.

C.

The password is sent in clear text format to the Web server.

D.

It can be brute forced easily.

Pervasive IS controls can be used across all the internal departments and external contractors to define the direction and behavior required for the technology to function properly. When these controls are implemented properly, which of the following areas show the reliability improvement? (Choose three)

A.

Hardware development

B.

Software development

C.

Security administration

D.

Disaster recovery

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to impose some special access restrictions on users. Which of the following Unix configuration files can you use to accomplish the task?

A.

/var/run/utmp

B.

/etc/terminfo

C.

/etc/usertty

D.

/etc/termcap

Which of the following policies helps reduce the potential damage from the actions of one person?

A.

CSA

B.

Separation of duties

C.

Internal audit

D.

Risk assessment