AIt lists all of the TCP port numbers in a TCP stream
BIt lists all of the packets that have a TCP layer
CIt lists the contents of the TCP layer
DIt lists all of the fields associated with the TCP layer
Which of the following would produce this list?
[65, 66, 67, 68]
Arange(1,4) + 64
Bfor x(4)+64
Cmap(ord, ג€ABCDג€)
Drange(4)+ 65
What is the output of the following line of code typed into a Python interactive session?
>>> print (int(1111,2))
A1111
B16
Cג€1111ג€
D15
Review the following code:
What is the output?
A(1, 0)
B(1,)
C(256,)
D(\x01, \x00)
Examine the code snippet below. What will be the contents of the variable `˜i' during the loops first iteration?
Ais
B1
C0
DPython
What does the LIMIT function restrict in an SQL SELECT statement?
AThe number of queries that can be run against the table per second.
BThe number of records a table is permitted to hold.
CThe number of records that will be returned by a request.
DThe number of subsequent SELECT statements that can be run against the table
Variable traffic contains a Scapy packet list. A programmer runs the following command: p1=traffic[1]
Which of the following describes the contents of p1, with respect to the traffic packet list?
AAll Ethernet layer frames
BThe contents of the second packet
CTCP streams with a session ID of 1
DThe data stored from the first byte onward
A log file is stored in variable a. The file has the following format for each log entry, in order, stored in big endian:
Field 1: 2-byte integer -
Field 2: 2-byte integer -
Field 3: 4-byte integer -
Which of the following would unpack a line from the log file into the proper fields?
Astruct.unpack('>HH4s',a)
Bstruct.unpack('<HHssss',a)
Cstruct.unpack('>HHHH',a)
Dstruct.unpack('!BxBx4s',a)
What is the output when the following commands are typed in Python interactive mode?
A['tag to go tag', 'to sans tag']
B['tag to go tag', 'tag to sans tag']
C['tag to go tag']
D['tag to go tag to sans tag']
What does the attacker do in a SQL Injection attack?
AObtains an administrative login for a SQL database server
BFinds and exploits CVSS-SIG vulnerabilities in a particular version of SQL database
CInject information into an SQL server via an undocumented administrative interface
DSubmits a string that is interpreted as a SQL database command
Which of the following modules allows a programmer to specify and spawn new processes, connect to their input and output pipes, and retrieve returned data?
Apip
Burllib2
Csubprocess
Dprochandle
Which of the lambda definitions of the function some_code is equivalent to the following function definition?
Asome_code = lambda outvalue:invalue*2
Bsome_code = lambda invalue:outvalue*2
Csome_code = lambda invalue:invalue*2
After calling a subprocess in a Python program, the program returns an error code of 0. What does this indicate?
AThe subprocess did not run
BThe subprocess terminated with no errors
CThe subprocess entered an infinite loop condition
DThe subprocess encountered a race condition
Which of the following import statements will add the ability to parse data with regular expressions to your script?