Exam 12: Buffer Overflows

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To circumvent stack buffer overflows, programmers create applications that do not allow extra characters to be accepted by a variable making the traditional buffer overflow method problematic. This check can be bypassed by using the ____ method.

Free
(Multiple Choice)
5.0/5
(28)
Correct Answer:
Verified

C

The ____ function is a secure replacement for the gets() function.

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

D

Buffer overflows can be divided into two categories: _________________________ and heap overflow.

Free
(Short Answer)
4.9/5
(28)
Correct Answer:
Verified

stack overflow

Buffer overflow is a condition common to structured programming languages such as the "C" language.

(True/False)
4.8/5
(44)

What are the steps involved in a buffer overflow exploit?

(Essay)
4.8/5
(47)

The "____" language was used to write utilities and operating systems, including UNIX and Windows.

(Multiple Choice)
4.9/5
(32)

A(n) ____________________ is known as the corruption of the instruction pointer, which points to the memory area where the function to be executed is stored.

(Short Answer)
4.8/5
(36)

A heap provides a permanent memory space unlike the temporary memory space that is provided by a stack.

(True/False)
4.9/5
(40)

On some specific operating systems, the kernel can be patched in such a way that running processes are not affected by buffer overflow conditions. This patch is called ______________________________.

(Short Answer)
4.8/5
(39)

The ____ bug targets the variables that are used by functions to store values.

(Multiple Choice)
4.8/5
(35)

How can buffer overflows be avoided?

(Essay)
4.8/5
(33)

A stack cannot store details regarding the function that called the currently executing function.

(True/False)
4.7/5
(40)

Buffer overflows are always intentional attacks.

(True/False)
4.7/5
(36)

____________________ has a goal of overloading the memory space provided to the variable. This might either allow the attacker to crash the computer or break into it.

(Short Answer)
4.9/5
(32)

Why do programs need a memory stack area?

(Essay)
4.9/5
(31)

____________________ happens when input applied to a variable is larger than the memory allotted to that variable.

(Short Answer)
4.8/5
(21)

When a user requests to execute a "C" program file, the primary function referred to is the ____ function.

(Multiple Choice)
4.9/5
(32)

Functions use variables to store values that may be stored temporarily or permanently.

(True/False)
4.9/5
(40)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)