Exam 12: Buffer Overflows
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
To circumvent stack buffer overflows, programmers create applications that do not allow extra characters to be accepted by a variable making the traditional buffer overflow method problematic. This check can be bypassed by using the ____ method.
Free
(Multiple Choice)
5.0/5
(28)
Correct Answer:
C
The ____ function is a secure replacement for the gets() function.
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
D
Buffer overflows can be divided into two categories: _________________________ and heap overflow.
Free
(Short Answer)
4.9/5
(28)
Correct Answer:
stack overflow
Buffer overflow is a condition common to structured programming languages such as the "C" language.
(True/False)
4.8/5
(44)
The "____" language was used to write utilities and operating systems, including UNIX and Windows.
(Multiple Choice)
4.9/5
(32)
A(n) ____________________ is known as the corruption of the instruction pointer, which points to the memory area where the function to be executed is stored.
(Short Answer)
4.8/5
(36)
A heap provides a permanent memory space unlike the temporary memory space that is provided by a stack.
(True/False)
4.9/5
(40)
On some specific operating systems, the kernel can be patched in such a way that running processes are not affected by buffer overflow conditions. This patch is called ______________________________.
(Short Answer)
4.8/5
(39)
The ____ bug targets the variables that are used by functions to store values.
(Multiple Choice)
4.8/5
(35)
A stack cannot store details regarding the function that called the currently executing function.
(True/False)
4.7/5
(40)
____________________ has a goal of overloading the memory space provided to the variable. This might either allow the attacker to crash the computer or break into it.
(Short Answer)
4.9/5
(32)
____________________ happens when input applied to a variable is larger than the memory allotted to that variable.
(Short Answer)
4.8/5
(21)
When a user requests to execute a "C" program file, the primary function referred to is the ____ function.
(Multiple Choice)
4.9/5
(32)
Functions use variables to store values that may be stored temporarily or permanently.
(True/False)
4.9/5
(40)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)