Which of the following is designed to detect the unwanted presence of fire by monitoring environmental changes associated with combustion?
Answer :
Fire alarm system
John works as a C programmer. He develops the following C program:
#include < stdlib.h >
#include < stdio.h >
#include < string.h >
int buffer(char *str) {
char buffer1[10];
strcpy(buffer1, str);
return 1;
}
int main(int argc, char *argv[]) {
buffer (argv[1]);
printf(“Executed\n”);
return 1;
}
His program is vulnerable to a __________ attack.
Answer :
Buffer overflow
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? (Select all that apply)
Answer :
Wireless sniffer
Protocol analyzer
In which of the following conditions does the system enter ROM monitor mode? (Select all that apply)
Answer :
The user interrupts the boot sequence.
The router does not find a valid operating system image.
Which of the following is a protocol that describes an approach to providing “streamlined” support of OSI application services on top of TCP/IP-based networks for some constrained environments?
Answer :
Lightweight Presentation Protocol
You are an Administrator for a network at an investment bank. You are concerned about individuals breaching your network and being able to steal data before you can detect their presence and shut down their access. Which of the following is the best way to address this issue?
Answer :
Implement a honey pot
Which of the following is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients? (Select all that apply)
Answer :
E-mail spam
Junk mail
Which of the following is a distributed multi-access network that helps in supporting integrated communications using a dual bus and distributed queuing?
Answer :
Distributed-queue dual-bus
Which of the following is a distributed application architecture that partitions tasks or workloads between service providers and service requesters? (Select all that apply)
Answer :
Client-server computing
Client-server networking
Which of the following is an attack on a website that changes the visual appearance of the site and seriously damages the trust and reputation of the website?