Exam 10: Buffer Overflow

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Stackshield,Return Address Defender and ________ are GCC compiler extensions that insert additional function entry and exit code.

Free
(Short Answer)
4.8/5
(28)
Correct Answer:
Verified

Stackguard

_______ defenses involve changes to the memory management of the virtual address space of processes that act to either alter the properties of regions of memory or to make predicting the location of target buffers sufficiently difficult to thwart many types of attacks.

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

C

The x86 Assembly Language Instruction NOP means _______.

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

A

Memory is requested from the ______ by programs for use in dynamic data structures,such as linked lists of records.

(Multiple Choice)
4.7/5
(39)

The JAVA programming language is extremely vulnerable to buffer overflows.

(True/False)
4.8/5
(41)

Shellcode is not specific to a particular processor architecture.

(True/False)
4.9/5
(26)

A _______ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer.

(Multiple Choice)
4.7/5
(29)

In 1996 ________ published "Smashing the Stack for Fun and Profit" in Phrack magazine,giving a step-by-step introduction to exploiting stack-based buffer overflow vulnerabilities.

(Short Answer)
4.8/5
(38)

The _______ exploited a buffer overflow in Microsoft SQL Server 2000.

(Multiple Choice)
4.7/5
(25)

A runtime technique that can be used is to place ________ between critical regions of memory in a processes address space.

(Multiple Choice)
4.7/5
(38)

A ________ is a condition where more input is placed into a buffer or data holding area than the capacity allocated and thus overwrites other information.

(Short Answer)
4.8/5
(43)

The possibility of overwriting the saved frame pointer and return address forms the core of a stack overflow attack.

(True/False)
4.8/5
(43)

________ involve buffers located in the program's global (or static)data area.

(Multiple Choice)
4.8/5
(32)

The only consequence of a buffer overflow attack is the possible corruption of data used by the program.

(True/False)
4.9/5
(35)

Randomizing the allocation of memory on the heap makes the possibility of predicting the address of targeted buffers extremely difficult,thus thwarting the successful execution of some __________ attacks.

(Multiple Choice)
4.9/5
(28)

Buffer overflow attacks result from careless programming in applications.

(True/False)
4.8/5
(43)

A _________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-sized buffer and consequently overwrites adjacent memory locations.

(Short Answer)
4.7/5
(32)

The attacker can specify the return address used to enter code as a location somewhere in the run of NOPs,which is called a NOP ______.

(Short Answer)
4.9/5
(24)

A _______ overflow occurs when the targeted buffer is located on the stack,usually as a local variable in a function's stack frame.

(Short Answer)
4.8/5
(29)

The _________ project produces a free,multiplatform 4.4BSD-based UNIX-like operating system.

(Short Answer)
4.8/5
(26)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)