Deck 9: Secure Programming With Perl

Full screen (f)
exit full mode
Question
8)The main purpose of ____ is to isolate tainted data so that the script cannot use it to perform tasks unintentionally.

A) safe mode
B) taint mode
C) sandbox mode
D) domain mode
Use Space or
up arrow
down arrow
to flip the card.
Question
12)In Perl, the ternary conditional operator "____" is an exception to the principle of "one tainted value taints the whole expression."

A) ++
B) ?:
C) *=
D) &&
Question
10)Perl's ____ allows developers program security even when running extra privileges such as setuid or setgid programs.

A) taint mode
B) safe mode
C) domain mode
D) sandbox mode
Question
19)The goal of the ____ library is to provide classes and functions that allow developers to write WWW clients.

A) LWP
B) CPAN
C) WWP
D) perl-weblib
Question
17)____ is an algorithm based on a random permutation using a variable key-size stream cipher with byte-oriented operations.

A) RC4
B) SHA1
C) MD5
D) RSA
Question
18)____ is a set of Perl modules that provide a simple and consistent Application Programming Interface (API) to the World Wide Web.

A) Crypt::Web:Lib
B) RC4
C) Crypt::Lib:Web
D) LWP
Question
6)____ is a general-purpose scripting language that is widely used to implement common gateway interface (CGI).

A) Java
B) Python
C) Ruby
D) Perl
Question
1)Hypertext transfer protocol (HTTP) only allows one-way communication from the server to the client (Web browser).
Question
16)The Perl's ____ function is based on the data encryption standard (DES) algorithm, and its variations are intended to discourage the use of hardware implementations of a key search.

A) des()
B) crypt()
C) password()
D) passwd()
Question
3)In Perl, any subexpression is considered tainted if all of the elements in the expression are tainted.
Question
15)____ is a search engine for the distributions, modules, documentation, and IDs on CPAN.

A) Perl search
B) Google-Perl
C) Google.CPAN
D) CPAN search
Question
4)Once a variable is tainted, Perl will allow you to use it in a system() , exec() , piped open, eval() , backtick , or unlink command.
Question
2)Since CGI scripts are designed to run by individuals around the world, they are the prime targets for malicious users to exploit any vulnerability.
Question
9)The setuid and ____ are UNIX functions that deal with privileges.

A) setdid
B) setoid
C) setgid
D) setprv
Question
7)____ permits communication and interaction from the client to the server for producing dynamic, two-way Web pages.

A) CGI
B) HTTP
C) HTTPS
D) HTTP2
Question
13)____ is a tool designed to help developers to write safer scripts by forcing them to think about external input validation and protecting them from accidentally performing unsafe operations, such as unwillingly changing external resources.

A) Safe mode
B) Sandbox mode
C) Domain mode
D) Taint mode
Question
14)Variables are considered ____ if they are set with values that are retrieved from outside of the script.

A) sandboxed
B) secure
C) tainted
D) safe
Question
20)Communication in LWP follows hypertext transfer protocol (HTTP) and is ____.

A) stateful
B) stateless
C) state-aware
D) state-smart
Question
11)You can enable taint mode explicitly by using the command line flag ____.

A) -A
B) -S
C) -T
D) -X
Question
5)It is a good practice to verify that a variable you are planning to untaint has only bad characters (black listing) rather than check whether or not it has any good characters (white listing).
Question
38)Briefly describe the Perl's crypt() function.
Question
29)The _________________________ module enables a Perl program to use OpenSSL to parse an X.509-formatted certificate.
Question
28)Perl provides a built-in security-checking mechanism called ____________________.
Question
39)What are the steps followed by a communication in LWP?
Question
40)What are the characteristics of a namespace when Perl is in safe mode?
Question
33)What are some of the characteristics of Perl's taint mode?
Question
25)The safe module operation ____ returns a glob reference for the symbol table entry of VARNAME in the package of the compartment.

A) reval (STRING)
B) deny_only (OP, ...)
C) share (NAME, ...)
D) varglob (VARNAME)
Question
22)____ provides internal data checking for developers to catch malicious data coming into the program.

A) Taint mode
B) Domain mode
C) Sandbox mode
D) Safe mode
Question
24)The safe module operation ____ permits only the provided list of operators to be used when compiling code in the compartment.

A) permit (OP, ...)
B) permit_only (OP, ...)
C) trap (OP, ...)
D) share (NAME, ...)
Question
26)The two areas of concern in file processing are temporary file creation and ____ in file access.

A) covert channels
B) side channels
C) race conditions
D) share conditions
Question
37)How can you set values for a variable in Perl?
Question
36)How can you untaint Perl variables?
Question
23)In Perl, ____ provides a "sandbox" environment that compiles and executes code in restricted compartments.

A) taint module
B) taint mode
C) safe module
D) domain mode
Question
31)In Perl, the RSA public key cryptography functions can be accessed through the _________________________ module.
Question
21)In order to provide support for the HTTPS protocol under LWP, we need the ____ Perl module.

A) LWP::UserAgent
B) Crypt::HTTPS
C) Crypt::SSLeay
D) Crypt::SSLAgent
Question
30)The ____________________ function is a built-in Perl routine usually used as the UNIX password-encryption function.
Question
34)What are some of the Perl's taint mode exceptions?
Question
27)Many programming languages can be used for building CGI, but the most common one is ____________________.
Question
35)How can you test whether a variable that contains tainted data will trigger an "Insecure dependency" message?
Question
What are the operator-access restrictions when Perl is in safe mode?
Question
Match between columns
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
CPAN
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
Crypt::OpenSSL::RSA
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
Crypt::OpenSSL::X509
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
CGI
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
LWP
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
PATH
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
Taint mode
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
setuid
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
RC4
environment variable that can be used by a Perl program
CPAN
environment variable that can be used by a Perl program
Crypt::OpenSSL::RSA
environment variable that can be used by a Perl program
Crypt::OpenSSL::X509
environment variable that can be used by a Perl program
CGI
environment variable that can be used by a Perl program
LWP
environment variable that can be used by a Perl program
PATH
environment variable that can be used by a Perl program
Taint mode
environment variable that can be used by a Perl program
setuid
environment variable that can be used by a Perl program
RC4
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
CPAN
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
Crypt::OpenSSL::RSA
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
Crypt::OpenSSL::X509
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
CGI
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
LWP
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
PATH
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
Taint mode
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
setuid
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
RC4
also referred to as the "libwww-perl" collection
CPAN
also referred to as the "libwww-perl" collection
Crypt::OpenSSL::RSA
also referred to as the "libwww-perl" collection
Crypt::OpenSSL::X509
also referred to as the "libwww-perl" collection
CGI
also referred to as the "libwww-perl" collection
LWP
also referred to as the "libwww-perl" collection
PATH
also referred to as the "libwww-perl" collection
Taint mode
also referred to as the "libwww-perl" collection
setuid
also referred to as the "libwww-perl" collection
RC4
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
CPAN
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
Crypt::OpenSSL::RSA
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
Crypt::OpenSSL::X509
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
CGI
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
LWP
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
PATH
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
Taint mode
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
setuid
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
RC4
a central Web repository for Perl modules and extensions
CPAN
a central Web repository for Perl modules and extensions
Crypt::OpenSSL::RSA
a central Web repository for Perl modules and extensions
Crypt::OpenSSL::X509
a central Web repository for Perl modules and extensions
CGI
a central Web repository for Perl modules and extensions
LWP
a central Web repository for Perl modules and extensions
PATH
a central Web repository for Perl modules and extensions
Taint mode
a central Web repository for Perl modules and extensions
setuid
a central Web repository for Perl modules and extensions
RC4
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
CPAN
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
Crypt::OpenSSL::RSA
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
Crypt::OpenSSL::X509
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
CGI
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
LWP
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
PATH
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
Taint mode
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
setuid
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
RC4
a specification for exchanging information between a Web server and an application program
CPAN
a specification for exchanging information between a Web server and an application program
Crypt::OpenSSL::RSA
a specification for exchanging information between a Web server and an application program
Crypt::OpenSSL::X509
a specification for exchanging information between a Web server and an application program
CGI
a specification for exchanging information between a Web server and an application program
LWP
a specification for exchanging information between a Web server and an application program
PATH
a specification for exchanging information between a Web server and an application program
Taint mode
a specification for exchanging information between a Web server and an application program
setuid
a specification for exchanging information between a Web server and an application program
RC4
a stream cipher designed by Ron Rivest for RSA Data Security
CPAN
a stream cipher designed by Ron Rivest for RSA Data Security
Crypt::OpenSSL::RSA
a stream cipher designed by Ron Rivest for RSA Data Security
Crypt::OpenSSL::X509
a stream cipher designed by Ron Rivest for RSA Data Security
CGI
a stream cipher designed by Ron Rivest for RSA Data Security
LWP
a stream cipher designed by Ron Rivest for RSA Data Security
PATH
a stream cipher designed by Ron Rivest for RSA Data Security
Taint mode
a stream cipher designed by Ron Rivest for RSA Data Security
setuid
a stream cipher designed by Ron Rivest for RSA Data Security
RC4
Question
42)Briefly describe race conditions in file access.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Secure Programming With Perl
1
8)The main purpose of ____ is to isolate tainted data so that the script cannot use it to perform tasks unintentionally.

A) safe mode
B) taint mode
C) sandbox mode
D) domain mode
B
2
12)In Perl, the ternary conditional operator "____" is an exception to the principle of "one tainted value taints the whole expression."

A) ++
B) ?:
C) *=
D) &&
B
3
10)Perl's ____ allows developers program security even when running extra privileges such as setuid or setgid programs.

A) taint mode
B) safe mode
C) domain mode
D) sandbox mode
A
4
19)The goal of the ____ library is to provide classes and functions that allow developers to write WWW clients.

A) LWP
B) CPAN
C) WWP
D) perl-weblib
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
17)____ is an algorithm based on a random permutation using a variable key-size stream cipher with byte-oriented operations.

A) RC4
B) SHA1
C) MD5
D) RSA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
18)____ is a set of Perl modules that provide a simple and consistent Application Programming Interface (API) to the World Wide Web.

A) Crypt::Web:Lib
B) RC4
C) Crypt::Lib:Web
D) LWP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
6)____ is a general-purpose scripting language that is widely used to implement common gateway interface (CGI).

A) Java
B) Python
C) Ruby
D) Perl
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
1)Hypertext transfer protocol (HTTP) only allows one-way communication from the server to the client (Web browser).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
16)The Perl's ____ function is based on the data encryption standard (DES) algorithm, and its variations are intended to discourage the use of hardware implementations of a key search.

A) des()
B) crypt()
C) password()
D) passwd()
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
3)In Perl, any subexpression is considered tainted if all of the elements in the expression are tainted.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
15)____ is a search engine for the distributions, modules, documentation, and IDs on CPAN.

A) Perl search
B) Google-Perl
C) Google.CPAN
D) CPAN search
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
4)Once a variable is tainted, Perl will allow you to use it in a system() , exec() , piped open, eval() , backtick , or unlink command.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
2)Since CGI scripts are designed to run by individuals around the world, they are the prime targets for malicious users to exploit any vulnerability.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
9)The setuid and ____ are UNIX functions that deal with privileges.

A) setdid
B) setoid
C) setgid
D) setprv
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
7)____ permits communication and interaction from the client to the server for producing dynamic, two-way Web pages.

A) CGI
B) HTTP
C) HTTPS
D) HTTP2
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
13)____ is a tool designed to help developers to write safer scripts by forcing them to think about external input validation and protecting them from accidentally performing unsafe operations, such as unwillingly changing external resources.

A) Safe mode
B) Sandbox mode
C) Domain mode
D) Taint mode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
14)Variables are considered ____ if they are set with values that are retrieved from outside of the script.

A) sandboxed
B) secure
C) tainted
D) safe
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
20)Communication in LWP follows hypertext transfer protocol (HTTP) and is ____.

A) stateful
B) stateless
C) state-aware
D) state-smart
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
11)You can enable taint mode explicitly by using the command line flag ____.

A) -A
B) -S
C) -T
D) -X
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
5)It is a good practice to verify that a variable you are planning to untaint has only bad characters (black listing) rather than check whether or not it has any good characters (white listing).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
38)Briefly describe the Perl's crypt() function.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
29)The _________________________ module enables a Perl program to use OpenSSL to parse an X.509-formatted certificate.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
28)Perl provides a built-in security-checking mechanism called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
39)What are the steps followed by a communication in LWP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
40)What are the characteristics of a namespace when Perl is in safe mode?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
33)What are some of the characteristics of Perl's taint mode?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
25)The safe module operation ____ returns a glob reference for the symbol table entry of VARNAME in the package of the compartment.

A) reval (STRING)
B) deny_only (OP, ...)
C) share (NAME, ...)
D) varglob (VARNAME)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
22)____ provides internal data checking for developers to catch malicious data coming into the program.

A) Taint mode
B) Domain mode
C) Sandbox mode
D) Safe mode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
24)The safe module operation ____ permits only the provided list of operators to be used when compiling code in the compartment.

A) permit (OP, ...)
B) permit_only (OP, ...)
C) trap (OP, ...)
D) share (NAME, ...)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
26)The two areas of concern in file processing are temporary file creation and ____ in file access.

A) covert channels
B) side channels
C) race conditions
D) share conditions
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
37)How can you set values for a variable in Perl?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
36)How can you untaint Perl variables?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
23)In Perl, ____ provides a "sandbox" environment that compiles and executes code in restricted compartments.

A) taint module
B) taint mode
C) safe module
D) domain mode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
31)In Perl, the RSA public key cryptography functions can be accessed through the _________________________ module.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
21)In order to provide support for the HTTPS protocol under LWP, we need the ____ Perl module.

A) LWP::UserAgent
B) Crypt::HTTPS
C) Crypt::SSLeay
D) Crypt::SSLAgent
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
30)The ____________________ function is a built-in Perl routine usually used as the UNIX password-encryption function.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
34)What are some of the Perl's taint mode exceptions?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
27)Many programming languages can be used for building CGI, but the most common one is ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
35)How can you test whether a variable that contains tainted data will trigger an "Insecure dependency" message?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the operator-access restrictions when Perl is in safe mode?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
CPAN
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
Crypt::OpenSSL::RSA
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
Crypt::OpenSSL::X509
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
CGI
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
LWP
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
PATH
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
Taint mode
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
setuid
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
RC4
environment variable that can be used by a Perl program
CPAN
environment variable that can be used by a Perl program
Crypt::OpenSSL::RSA
environment variable that can be used by a Perl program
Crypt::OpenSSL::X509
environment variable that can be used by a Perl program
CGI
environment variable that can be used by a Perl program
LWP
environment variable that can be used by a Perl program
PATH
environment variable that can be used by a Perl program
Taint mode
environment variable that can be used by a Perl program
setuid
environment variable that can be used by a Perl program
RC4
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
CPAN
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
Crypt::OpenSSL::RSA
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
Crypt::OpenSSL::X509
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
CGI
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
LWP
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
PATH
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
Taint mode
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
setuid
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
RC4
also referred to as the "libwww-perl" collection
CPAN
also referred to as the "libwww-perl" collection
Crypt::OpenSSL::RSA
also referred to as the "libwww-perl" collection
Crypt::OpenSSL::X509
also referred to as the "libwww-perl" collection
CGI
also referred to as the "libwww-perl" collection
LWP
also referred to as the "libwww-perl" collection
PATH
also referred to as the "libwww-perl" collection
Taint mode
also referred to as the "libwww-perl" collection
setuid
also referred to as the "libwww-perl" collection
RC4
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
CPAN
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
Crypt::OpenSSL::RSA
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
Crypt::OpenSSL::X509
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
CGI
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
LWP
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
PATH
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
Taint mode
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
setuid
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
RC4
a central Web repository for Perl modules and extensions
CPAN
a central Web repository for Perl modules and extensions
Crypt::OpenSSL::RSA
a central Web repository for Perl modules and extensions
Crypt::OpenSSL::X509
a central Web repository for Perl modules and extensions
CGI
a central Web repository for Perl modules and extensions
LWP
a central Web repository for Perl modules and extensions
PATH
a central Web repository for Perl modules and extensions
Taint mode
a central Web repository for Perl modules and extensions
setuid
a central Web repository for Perl modules and extensions
RC4
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
CPAN
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
Crypt::OpenSSL::RSA
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
Crypt::OpenSSL::X509
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
CGI
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
LWP
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
PATH
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
Taint mode
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
setuid
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
RC4
a specification for exchanging information between a Web server and an application program
CPAN
a specification for exchanging information between a Web server and an application program
Crypt::OpenSSL::RSA
a specification for exchanging information between a Web server and an application program
Crypt::OpenSSL::X509
a specification for exchanging information between a Web server and an application program
CGI
a specification for exchanging information between a Web server and an application program
LWP
a specification for exchanging information between a Web server and an application program
PATH
a specification for exchanging information between a Web server and an application program
Taint mode
a specification for exchanging information between a Web server and an application program
setuid
a specification for exchanging information between a Web server and an application program
RC4
a stream cipher designed by Ron Rivest for RSA Data Security
CPAN
a stream cipher designed by Ron Rivest for RSA Data Security
Crypt::OpenSSL::RSA
a stream cipher designed by Ron Rivest for RSA Data Security
Crypt::OpenSSL::X509
a stream cipher designed by Ron Rivest for RSA Data Security
CGI
a stream cipher designed by Ron Rivest for RSA Data Security
LWP
a stream cipher designed by Ron Rivest for RSA Data Security
PATH
a stream cipher designed by Ron Rivest for RSA Data Security
Taint mode
a stream cipher designed by Ron Rivest for RSA Data Security
setuid
a stream cipher designed by Ron Rivest for RSA Data Security
RC4
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
42)Briefly describe race conditions in file access.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.