2.
(a)
Buffer overflow exploits. Format-String exploits
(b)
These exploits cannot really be prevented. But by having a much deeper knowledge of file permissions, variables, memory allocation, functions and assembly language, the hackers exploits can quickly be identified and rectified.
(c)
It's positive and negative. Positive in the sense that the particular exploit is known and so an appropriate anti-virus software can be developed. Negative in the sense that it provides a training enviroment for the wood-be-hacker.
(d)
Network administrators should leave security to companies that specialise in the complex field of security.