Exam 10: Buffer Overflow
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
One of the restrictions on the content of shellcode is that it has to be _______,which means that it cannot contain any absolute address referring to itself.
(Short Answer)
4.8/5
(35)
A stack overflow can result in some form of denial-of-service attack on
a system.
(True/False)
4.8/5
(31)
______ defenses aim to harden programs to resist attacks in new programs.
(Short Answer)
4.8/5
(35)
A stack buffer overflow attack is also referred to as ______.
(Multiple Choice)
4.9/5
(31)
In 2004 the ________ exploited a buffer overflow in Microsoft Windows 2000/XP Local Security Authority Subsystem Service.
(Multiple Choice)
4.8/5
(34)
________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred,but due to a coding error,allows just one more byte to be copied than there is space available.
(Short Answer)
4.8/5
(33)
The _________ aims to provide useful information to people who perform penetration testing,IDS signature development,and exploit research.
(Multiple Choice)
4.8/5
(38)
To exploit any type of buffer overflow the attacker needs to understand
how that buffer will be stored in the processes memory.
(True/False)
4.8/5
(27)
The function of the _______ was to transfer control to a user command line interpreter that gave access to any program available on the system with the privileges of the attacked program.
(Short Answer)
4.8/5
(39)
A ______ is a structure where data are usually saved on the stack.
(Multiple Choice)
4.9/5
(43)
The attacker is able to precisely specify the starting address of the
instructions in the shellcode.
(True/False)
4.9/5
(30)
A successful buffer overflow attack results in the loss of the function
or service the attacked program provided.
(True/False)
4.7/5
(32)
C's designers placed much more emphasis on space efficiency and
performance considerations than on type safety.
(True/False)
4.8/5
(27)
Several of the items in the CWE/SANS Top 25 Most Dangerous
Software Errors list,Risky Resource Management category,are buffer
overflow variants.
(True/False)
4.9/5
(30)
The buffer overflow type of attack is one of the least commonly seen
attacks.
(True/False)
4.8/5
(17)
An effective method for protecting programs against classic stack
overflow attacks is to instrument the function entry and exit code to
setup and then check its sack frame for any evidence of corruption.
(True/False)
4.7/5
(36)
The responsibility is placed on the assembly language programmer to
ensure that the correct interpretation is placed on any saved data value.
(True/False)
4.8/5
(38)
_______ defenses aim to detect and abort attacking existing programs.
(Short Answer)
4.8/5
(36)
At the basic machine level,all of the data manipulated by machine instructions executed by the computer processor are stored in either the processor's registers or in ________.
(Short Answer)
4.8/5
(44)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)