Exam 10: Buffer Overflow
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Stackshield,Return Address Defender and ________ are GCC compiler extensions that insert additional function entry and exit code.
Free
(Short Answer)
4.8/5
(28)
Correct Answer:
Stackguard
_______ defenses involve changes to the memory management of the virtual address space of processes that act to either alter the properties of regions of memory or to make predicting the location of target buffers sufficiently difficult to thwart many types of attacks.
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
C
The x86 Assembly Language Instruction NOP means _______.
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
A
Memory is requested from the ______ by programs for use in dynamic data structures,such as linked lists of records.
(Multiple Choice)
4.7/5
(39)
The JAVA programming language is extremely vulnerable to buffer
overflows.
(True/False)
4.8/5
(41)
Shellcode is not specific to a particular processor architecture.
(True/False)
4.9/5
(26)
A _______ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer.
(Multiple Choice)
4.7/5
(29)
In 1996 ________ published "Smashing the Stack for Fun and Profit" in Phrack magazine,giving a step-by-step introduction to exploiting stack-based buffer overflow vulnerabilities.
(Short Answer)
4.8/5
(38)
The _______ exploited a buffer overflow in Microsoft SQL Server 2000.
(Multiple Choice)
4.7/5
(25)
A runtime technique that can be used is to place ________ between critical regions of memory in a processes address space.
(Multiple Choice)
4.7/5
(38)
A ________ is a condition where more input is placed into a buffer or data holding area than the capacity allocated and thus overwrites other information.
(Short Answer)
4.8/5
(43)
The possibility of overwriting the saved frame pointer and return
address forms the core of a stack overflow attack.
(True/False)
4.8/5
(43)
________ involve buffers located in the program's global (or static)data area.
(Multiple Choice)
4.8/5
(32)
The only consequence of a buffer overflow attack is the possible
corruption of data used by the program.
(True/False)
4.9/5
(35)
Randomizing the allocation of memory on the heap makes the possibility of predicting the address of targeted buffers extremely difficult,thus thwarting the successful execution of some __________ attacks.
(Multiple Choice)
4.9/5
(28)
Buffer overflow attacks result from careless programming in
applications.
(True/False)
4.8/5
(43)
A _________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-sized buffer and consequently overwrites adjacent memory locations.
(Short Answer)
4.7/5
(32)
The attacker can specify the return address used to enter code as a location somewhere in the run of NOPs,which is called a NOP ______.
(Short Answer)
4.9/5
(24)
A _______ overflow occurs when the targeted buffer is located on the stack,usually as a local variable in a function's stack frame.
(Short Answer)
4.8/5
(29)
The _________ project produces a free,multiplatform 4.4BSD-based UNIX-like operating system.
(Short Answer)
4.8/5
(26)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)