What type of cryptography is demonstrated by reversing the alphabet so A becomes Z, B becomes Y,
and so on? - (answer)substitution cipher
Closed ports respond to a NULL scan with what type of packet? - (answer)RST
What port does the Domain Name System, or DNS service use? - (answer)53
Early Windows OSs used which of the following programs loaded into memory to interact with a
network resource or device? - (answer)NetBIOS
In the TCP/IP stack, the Transport layer includes network services and client software - (answer)False
In the Perl programming language, comment lines begin with the which of the following character(s)? -
(answer)#
When a programmer exploits written code that doesn't check for a defined amount of memory space
they are executing which of the following attacks? - (answer)buffer overflow
Which utility can extract meta-data and documents on a Website to reveal the document creator's
network login, e-mail
address, IP address, and other important information? - (answer)FOCA
Which of the following can be a small program developed specifically for use with embedded systems,
or a stripped-down version of an OS commonly used on general-purpose computers? -
(answer)embedded OS
Which of the following application tests analyzes an application's source code for vulnerabilities, and is
therefore only possible when the source code of an application is available? - (answer)Static Application
Security Testing
The virus signature file is maintained by what type of software? - (answer)antivirus