Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which statement will catch all types of exceptions? Select one. Question 1 options: catch ( Exception& ex ) { } catch ( . . .

Which statement will catch all types of exceptions? Select one.
Question 1 options:
catch(Exception& ex){}
catch(...){}
catch_all(){}
catch(){}
catch_all(...){}
Question 2(5 points)
Listen
What is defense in depth? Select one.
Question 2 options:
When a single security attack vector is defended in many nonredundant layers of security
When a single security attack vector is defended in many redundant layers of security
When multiple single security attack vectors are individually defended in multiple nonredundant layers
When multiple security attack vectors are defended with overlapping and multiple redundant layers
When multiple security attack vectors are defended with one layer
Question 3(5 points)
Saved
Listen
Which is not a way to address cybersecurity?
Question 3 options:
Eliminate using C++.
Periodically run simulated attacks to check for cyber weakness.
Treat everything on your network, including custom-built software, as an attack vector.
Model threats and have a rapid-response team for cyberthreats.
Always assume you are under attack.
Question 4(5 points)
Listen
What will happen with the declaration "int a[100];" followed by the code "a[4242]=0xDEADBEEF;"? Select one.
Question 4 options:
The compiler will show an error and not compile.
The memory at A[4242] will be overwritten with 0xDEADBEEF.
Nothing will happen.
A runtime error will happen.
An exception will be thrown.
Question 5(5 points)
Listen
Which function declaration states that no exceptions will be thrown by a method? Select all that apply.
Question 5 options:
void does_something(void) throw(){}
void does_something(void) noexcept {}
void does_something(void) nothrow(){}
noexcept(true){}
Question 6(5 points)
Saved
Listen
Which data types in C++ can overflow and underflow?
Question 6 options:
Only character types (char, wchar_t)
Integer, floats, doubles, and character types
Only integer types
Only integer, floats, and doubles
Only floats and doubles
Question 7(5 points)
Listen
What type of operations most likely lead to buffer overflows? Select one.
Question 7 options:
Array indexing and pointer math
Array indexing and std::string functions
Array indexing
Pointer math and std::string functions
Pointer math
Question 8(5 points)
Listen
What is the difference between assert() and static_assert()? Select one.
Question 8 options:
assert() is a compile check of some condition and will create a compile-time error if the condition fails, and static_assert() is a runtime check of some condition and will create a runtime error if the condition fails.
assert() is a compile check of some condition and will create a compile-time error if the condition fails, and static_assert() is a compile check of some condition and will create a compile-time error if the condition fails.
assert() is a runtime check of some condition and will create a runtime error if the condition fails, and static_assert() is a compile check of some condition and will create a compile-time error if the condition fails.
assert() is a runtime check of some condition and will create a runtime error if the condition fails, and static_assert() is a runtime check of some condition and will create a runtime error if the condition fails.
Question 9(5 points)
Listen
Which type of application is most secure? Select one.
Question 9 options:
There is no such thing as a secure application.
An application on a Linux server in a data center with wired networking only
Apps on an iPhone with Wi-Fi, Bluetooth, and NFC connectivity
An application on a Windows desktop with wired and Wi-Fi networking
An application written in Java
An application on a Windows desktop with wired networking only
Question 10(5 points)
Listen
What are the three states of data? Select one.
Question 10 options:
Transit, compute, storage
On the wire, in memory, on disk
Liquid, ice, solid
In motion, in use, at rest

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Systems Analysis And Synthesis Bridging Computer Science And Information Technology

Authors: Barry Dwyer

1st Edition

0128054492, 9780128054499

More Books

Students also viewed these Databases questions

Question

What attracts you about this role?

Answered: 1 week ago

Question

How many states in India?

Answered: 1 week ago

Question

HOW IS MARKETING CHANGING WITH ARTIFITIAL INTELIGENCE

Answered: 1 week ago