Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the GIAC Security Certification: GPYC GPYC Questions and answers with ValidTests

Exam GPYC All Questions
Exam GPYC Premium Access

View all detail and faqs for the GPYC exam

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

What will the following code in Python 3 result in?

Question # 1

Options:

A.

outer x, outer x

B.

inner x, inner x

C.

global x, outer x

D.

NameError, outer

E.

inner x, outer x

Expert Solution
Questions # 2:

A log file is stored in variable "a". The file has the following format for each log entry, in order, stored in big endian:

Field 1: 2-byte integer

Field 2: 2-byte integer

Field 3: 4-byte string

Which of the following would unpack a line from the log file into the proper fields?

Options:

A.

struct. unpack('>HH4s',a)

B.

stmct.unpack('

C.

struct.unpack('>HHHH,/a)

D.

stnjct.unpack('!BxBx4s'/a)

Expert Solution
Questions # 3:

What does the attacker do in a SQL Injection attack?

Options:

A.

Obtains an administrative login for a SQL database server

B.

Finds and exploits CVSS-SIG vulnerabilities in a particular version of SQL database

C.

Inject information into an SQL server via an undocumented administrative interface

D.

Submits a string that is interpreted as a SQL database command

Expert Solution
Questions # 4:

After calling a subprocess in a Python program, the program returns an error code of "0". What does this indicate?

Options:

A.

The subprocess did not run

B.

The subprocess terminated with no errors

C.

The subprocess entered an infinite loop condition

D.

The subprocess encountered a race condition

Expert Solution
Questions # 5:

What is the output of the Is(TCP) function?

Options:

A.

It lists all of the TCP port numbers in a TCP stream

B.

It lists all of the packets that have a TCP layer

C.

It lists the contents of the TCP layer

D.

It lists all of the fields associated with the TCP layer

Expert Solution
Questions # 6:

Which of the following would produce this list?

[65, 66, 67, 68]

Options:

A.

range(l,4) + 64

B.

for x(4)+64

C.

map(ord, "ABCD")

D.

range(4)+ 65

Expert Solution
Questions # 7:

An attacker does not yet know the IP address of his target. He uses the "socket" module to create a backdoor program. He is writing the command to bind the computer's current IP address and port 4444 to the "backdoor" socket. Which command should he use?

Options:

A.

backdoor.bind(UDP, 4444)

B.

backdoor.bind()(4444)

C.

backdoor.bind((*))

D.

backdoor.bind(("",4444))

Expert Solution
Questions # 8:

What wilt the code in the screen capture print when executed?

Question # 8

Options:

A.

2

B.

4

C.

x

D.

An error

E.

6

Expert Solution
Questions # 9:

Which of the following commands would correct the error in the screenshot?

Question # 9

Options:

A.

import itertools

B.

modulus itertools

C.

return itertools

D.

define itertools

Expert Solution
Questions # 10:

Review the following Python code:

Question # 10

Options:

A.

'Jones','Johnson'

B.

"Brown'/Williams'

C.

'Brown'/Jones','Johnson','Williams'

D.

'Johnson'/JohnsonVWilliams'/Jones'/Jones'/Brown'

Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions