Chapter 9 ■ Practice Test 1 213
- Roger is concerned that a third-party firm hired to develop code for an internal applica-
tion will embed a backdoor in the code. The developer retains rights to the intellectual
property and will only deliver the software in its final form. Which one of the following
languages would be least susceptible to this type of attack because it would provide Roger
with code that is human-readable in its final form?
A. JavaScript
B. C
C. C++
D. Java - Jesse is looking at the /etc/passwd file on a system configured to use shadowed
passwords. What should she expect to see in the password field of this file?
A. Plaintext passwords
B. Encrypted passwords
C. Hashed passwords
D. x - SYN floods rely on implementations of what protocol to cause denial of service
conditions?
A. IGMP
B. UDP
C. TCP
D. ICMP - What principle states that an individual should make every effort to complete his or her
responsibilities in an accurate and timely manner?
A. Least privilege
B. Separation of duties
C. Due care
D. Due diligence - Cable modems, ISDN, and DSL are all examples of what type of technology?
A. Baseband
B. Broadband
C. Digital
D. Broadcast