Exam 10: Buffer Overflow

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One of the restrictions on the content of shellcode is that it has to be _______,which means that it cannot contain any absolute address referring to itself.

(Short Answer)
4.8/5
(35)

A stack overflow can result in some form of denial-of-service attack on a system.

(True/False)
4.8/5
(31)

______ defenses aim to harden programs to resist attacks in new programs.

(Short Answer)
4.8/5
(35)

A stack buffer overflow attack is also referred to as ______.

(Multiple Choice)
4.9/5
(31)

In 2004 the ________ exploited a buffer overflow in Microsoft Windows 2000/XP Local Security Authority Subsystem Service.

(Multiple Choice)
4.8/5
(34)

________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred,but due to a coding error,allows just one more byte to be copied than there is space available.

(Short Answer)
4.8/5
(33)

The _________ aims to provide useful information to people who perform penetration testing,IDS signature development,and exploit research.

(Multiple Choice)
4.8/5
(38)

To exploit any type of buffer overflow the attacker needs to understand how that buffer will be stored in the processes memory.

(True/False)
4.8/5
(27)

The function of the _______ was to transfer control to a user command line interpreter that gave access to any program available on the system with the privileges of the attacked program.

(Short Answer)
4.8/5
(39)

A ______ is a structure where data are usually saved on the stack.

(Multiple Choice)
4.9/5
(43)

Buffer overflows can be found in a wide variety of programs.

(True/False)
4.8/5
(27)

The attacker is able to precisely specify the starting address of the instructions in the shellcode.

(True/False)
4.9/5
(30)

A successful buffer overflow attack results in the loss of the function or service the attacked program provided.

(True/False)
4.7/5
(32)

C's designers placed much more emphasis on space efficiency and performance considerations than on type safety.

(True/False)
4.8/5
(27)

Several of the items in the CWE/SANS Top 25 Most Dangerous Software Errors list,Risky Resource Management category,are buffer overflow variants.

(True/False)
4.9/5
(30)

The buffer overflow type of attack is one of the least commonly seen attacks.

(True/False)
4.8/5
(17)

An effective method for protecting programs against classic stack overflow attacks is to instrument the function entry and exit code to setup and then check its sack frame for any evidence of corruption.

(True/False)
4.7/5
(36)

The responsibility is placed on the assembly language programmer to ensure that the correct interpretation is placed on any saved data value.

(True/False)
4.8/5
(38)

_______ defenses aim to detect and abort attacking existing programs.

(Short Answer)
4.8/5
(36)

At the basic machine level,all of the data manipulated by machine instructions executed by the computer processor are stored in either the processor's registers or in ________.

(Short Answer)
4.8/5
(44)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)