Company: Walmart_SDE_MCQ
Difficulty: medium
In network security, you want to perform a reflection-based distributed denial-of-service (DDoS) attack on a network. The attack must turn a small DNS query into a much larger payload. Which of the following extensions of the DNS protocol can be used to perform this operation? EDNS0 WDNS8 FDNS1 KDNS2 In an operating system, which of the following statements about a Semaphore in Java are true: 1. A semaphore is viewed as a protected integer variable. 2. The signal operation decrements the semaphore value, indicating that a resource is available. 3. A queue is used to hold processes waiting on the semaphore. 4. It is guaranteed that once a semaphore operation is started, no other process can access the semaphore until the operation is completed. 1, 2, and 4 1, 3, and 4 2, 3, and 4 All of these What is the output of the following JavaScript snippet: let empIDs = [465216, 748125, 787465, 89265, 656546, 153220]; for (let i = empIDs.length - 1; i >= 0; i--) { let j = Math.floor(Math.rando