1.
John works as a C programmer. He develops the following C program:
#include
#include
#include
int buffer(char *str) {
char buffer1[10];
strcpy(buffer1, str);
return 1;
}
int main(int argc, char *argv[]) {
buffer (argv[1]);
printf(Executed\n);
return 1;
}
His program is vulnerable to a __________ attack.
2.
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.
3.
Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?
4.
Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?
5.
Which of the following types of VPN uses the Internet as its main backbone, allowing users, customers, and branch offices to access corporate network resources across various network architectures?
6.
Which of the following is a distributed multi-access network that helps in supporting integrated communications using a dual bus and distributed queuing?
7.
Which of the following is an attack on a website that changes the visual appearance of the site and seriously damages the trust and reputation of the website?
8.
Which of the following is a network that supports mobile communications across an arbitrary number of wireless LANs and satellite coverage areas?
9.
Which of the following techniques is used for drawing symbols in public places for advertising an open Wi- Fi wireless network?
10.
Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?