146.
Adding to and removing from a program stack are known as what?
- A.Pop and lock
- B.Push and pop
- C.Stack and pull
- D.Plus and minus
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Adding an item to the stack is known as pushing, and removing an item from the stack is known as popping. Remember that adding and removing occur only at the top. |
147.
Zombies Inc. is looking for ways to better protect their web servers from potential DoS
attacks. Their web admin proposes the use of a network appliance that receives all
incoming web requests and forwards them to the web server. He says it will prevent
direct customer contact with the server and reduce the risk of DoS attacks. What
appliance is he proposing?
- A.Web proxy
- B.IDS
- C.Reverse proxy
- D.Firewall
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Reverse proxies are implemented to protect the destination resource, not the client or user. In this scenario, a reverse proxy will field all outside requests, thereby preventing direct traffic to the web server and reducing the risk of a DoS attack. |
148.
In a DDoS attack, what communications channel is commonly used to orchestrate the
attack?
- A.Internet Relay Chat (IRC)
- B.MSN Messenger
- C.ICMP
- D.Google Talk
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
A DDoS attacker commonly uses IRC to communicate with handlers, which in turn send the attack signal to the infected clients (zombies). |
149.
What is the name for the dynamic memory space that, unlike the stack, doesn’t rely on
sequential ordering or organization?
- A.Pointer
- B.Heap
- C.Pile
- D.Load
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Along with the stack, the heap provides a program with a dynamic memory space that can serve as a nonsequential storage location for variables and program items. |
150.
Which function(s) are considered dangerous because they don’t check memory
bounds? (Choose all that apply.)
- A.gets()
- B.strcpy()
- C.scanf()
- D.strcat()
- Answer & Explanation
- Report
Answer : [A, B, C, D]
Explanation :
Explanation :
All of these C functions are considered dangerous because they do not check memory bounds. Thus, code containing any of these can be part of a buffer overflow attack. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40