CEH

(Jeff_L) #1

280 Chapter 11 ■ Denial of Service



  1. Adding and removing to and from a program stack are known as what?
    A. Pop and lock
    B. Push and pop
    C. Stack and pull
    D. Plus and minus

  2. Zombies Inc. is looking for ways to better protect their web servers from potential DoS
    attacks. Their web admin proposes the use of a network appliance that receives all incom-
    ing web requests and forwards them to the web server. He says it will prevent direct cus-
    tomer contact with the server and reduce the risk of DoS attacks. What appliance is he
    proposing?
    A. Web proxy
    B. IDS
    C. Reverse proxy
    D. Firewall

  3. In a DDoS attack, what communications channel is commonly used to orchestrate the
    attack?
    A. Internet Relay Chat (IRC)
    B. MSN Messenger
    C. ICMP
    D. G oogle Talk

  4. What is the name for the dynamic memory space that, unlike the stack, doesn’t rely on
    sequential ordering or organization?
    A. Pointer
    B. Heap
    C. Pile
    D. Load

  5. Which function(s) are considered dangerous because they don’t check memory bounds?
    (Choose all that apply.)
    A. gets()
    B. strcpy()
    C. scanf()
    D. strcat()

  6. The stack operates on a basis.
    A. FIFO
    B. LIFO
    C. FILO
    D. LILO

Free download pdf