You must be logged in to view this content.
Quiz Summary
0 of 4 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 4 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- Current
- Review
- Answered
- Correct
- Incorrect
- Question 1 of 4
1. Question
1 point(s)You are reviewing some Java code for an application and come across the following snippet:
public class donuts {
public static void main (String[] args) {
object stuffed = null;
stuffed.heat ();
…
}
}You suspect that this will cause a problem. Which of the following BEST describes the problem?
CorrectIncorrect - Question 2 of 4
2. Question
1 point(s)Developers in your organization recently created a web application served by an Apache web server. However, testing shows that the site is susceptible to an attack allowing an attacker to create an HTML iframe within a web browser using JavaScript. Of the following choices, what best describes the attack in this scenario?
CorrectIncorrect - Question 3 of 4
3. Question
1 point(s)Lisa has been hired as an external consultant to review an organization’s SDLC. After analyzing their methods, she realizes that the SDLC process does not include a phase that allows team members to evaluate and provide critical feedback of other team member’s code. Which of the following should be added to the SDLC process?
CorrectIncorrect - Question 4 of 4
4. Question
1 point(s)A security tester executed the following command:
echo “vrfy ‘perl -e ‘print “a” x 999’ ‘ ” | nc getcertifiedgetahead.com 25
If successful, what will it do?CorrectIncorrect