John works as a C programmer. He develops the following C program:
#include
#include
#include
int buffer(char *str) {
char buffer1[10];
strcpy(buffer1, str);
return 1;
}
int main(int argc, char *argv[]) {
buffer (argv[1]);
printf("Executed\n");
return 1;
}
His program is vulnerable to a __________ attack.
Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following ports is assigned by the Internet Assigned Number Authority (IANA) for RADIUS accounting?
How many keys are used to encrypt data in symmetric encryption?
Which of the following languages is a fourth-generation language?
Which of the following terms is synonymous with the willful destruction of another person's property?
Which of the following statements about the authentication concept of information security management is true?
Which of the following is an open source network intrusion detection system?
Which of the following layers are the sub layers of the data-link layer?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is used in asymmetric encryption?
Which of the following are the common roles with regard to data in an information classification program?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails.
Which of the following will you use to accomplish this?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He notices that UDP port 137 of the We-are-secure server is open. Assuming that the Network Administrator of We-are-secure Inc. has not changed the default port values of the services, which of the following services is running on UDP port 137?
In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?
You work as a Network Administrator for McRoberts Inc. The company has a TCP-based network, which is connected to the Internet. Users use their Web browsers to connect to Web servers and to view different Web pages. Which of the following protocols ensures a secure connection between a Web browser and a Web server?