Questions for the GPYC were updated on : Nov 21 ,2025
An operator able to perform bitwise shifts is coded as (select two answers)
CD
What will be the value of the i variable when the while loop finishes its execution0
i = 0
while i != 0:
1 = 1-1
else:
i = i + 1
A
An attacker does not yet know the IP address of his target. He uses the "socket" module to create a
backdoor program. He is writing the command to bind the computer's current IP address and port
4444 to the "backdoor" socket. Which command should he use?
D
In a SQL injection attack, which character would an attacker use to separate multiple SQL statements
on a single line?
B
What will the last value of V be when Python executes the following control loop?
D
Which of the following modules allows a programmer to specify and spawn new processes, connect
to their input and output pipes, and retrieve returned data?
C
Which of the lambda definitions of the function some_code is equivalent to the following function
definition?
Which of the lambda definitions of the function some_code is equivalent to the following function
definition?
A
What does the following command do?
pip search syslog
A
With a requests session object named "browser", how can the expiration attribute of a cookie named
"MUID" from "gpyc.com/" be accessed?
A
What does the attacker do in a SQL Injection attack?
C
What is the output of the following line of code typed into a Python interactive session?
>>>print (8 <<1)
B
What does the following line of code do?
C
What will the following code in Python 3 result in?
A
During a password guessing attack, which HTTP request method would a Python program most
commonly call to submit a usemame and password to a target website?
B
Which of the following is the output when the following program is executed with a Python
Interpreter?
C