Question: 1
Which of the following IP addresses is the loopback address in IPv6?
Answer :
Show Answer
Hide Answer
Question: 2
John works as a C programmer. He develops the following C program:
#include
#include
#include
int buffer(char *str) {
char buffer1[10];
strcpy(buffer1, str);
return 1;
}
int main(int argc, char *argv[]) {
buffer (argv[1]);
printf("Executed\n");
return 1;
}
His program is vulnerable to a __________ attack.
Question: 3
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.
Question: 4
In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.
Question: 5
Which of the following protocols is used for exchanging routing information between two gateways in a network of autonomous systems?