280 Chapter 11 ■ Denial of Service
- Adding and removing to and from a program stack are known as what?
A. Pop and lock
B. Push and pop
C. Stack and pull
D. Plus and minus - Zombies Inc. is looking for ways to better protect their web servers from potential DoS
attacks. Their web admin proposes the use of a network appliance that receives all incom-
ing web requests and forwards them to the web server. He says it will prevent direct cus-
tomer contact with the server and reduce the risk of DoS attacks. What appliance is he
proposing?
A. Web proxy
B. IDS
C. Reverse proxy
D. Firewall - In a DDoS attack, what communications channel is commonly used to orchestrate the
attack?
A. Internet Relay Chat (IRC)
B. MSN Messenger
C. ICMP
D. G oogle Talk - What is the name for the dynamic memory space that, unlike the stack, doesn’t rely on
sequential ordering or organization?
A. Pointer
B. Heap
C. Pile
D. Load - Which function(s) are considered dangerous because they don’t check memory bounds?
(Choose all that apply.)
A. gets()
B. strcpy()
C. scanf()
D. strcat() - The stack operates on a basis.
A. FIFO
B. LIFO
C. FILO
D. LILO