Home
You may like this!
146.
Adding to and removing from a program stack are known as what?
  • A.
    Pop and lock
  • B.
    Push and pop
  • C.
    Stack and pull
  • D.
    Plus and minus
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Adding an item to the stack is known as pushing, and removing an item from the stack is known as popping. Remember that adding and removing occur only at the top.
Report
Name Email  
147.
Zombies Inc. is looking for ways to better protect their web servers from potential DoS attacks. Their web admin proposes the use of a network appliance that receives all incoming web requests and forwards them to the web server. He says it will prevent direct customer contact with the server and reduce the risk of DoS attacks. What appliance is he proposing?
  • A.
    Web proxy
  • B.
    IDS
  • C.
    Reverse proxy
  • D.
    Firewall
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Reverse proxies are implemented to protect the destination resource, not the client or user. In this scenario, a reverse proxy will field all outside requests, thereby preventing direct traffic to the web server and reducing the risk of a DoS attack.
Report
Name Email  
148.
In a DDoS attack, what communications channel is commonly used to orchestrate the attack?
  • A.
    Internet Relay Chat (IRC)
  • B.
    MSN Messenger
  • C.
    ICMP
  • D.
    Google Talk
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
A DDoS attacker commonly uses IRC to communicate with handlers, which in turn send the attack signal to the infected clients (zombies).
Report
Name Email  
149.
What is the name for the dynamic memory space that, unlike the stack, doesn’t rely on sequential ordering or organization?
  • A.
    Pointer
  • B.
    Heap
  • C.
    Pile
  • D.
    Load
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Along with the stack, the heap provides a program with a dynamic memory space that can serve as a nonsequential storage location for variables and program items.
Report
Name Email  
150.
Which function(s) are considered dangerous because they don’t check memory bounds? (Choose all that apply.)
  • A.
    gets()
  • B.
    strcpy()
  • C.
    scanf()
  • D.
    strcat()
  • Answer & Explanation
  • Report
Answer : [A, B, C, D]
Explanation :
All of these C functions are considered dangerous because they do not check memory bounds. Thus, code containing any of these can be part of a buffer overflow attack.
Report
Name Email