Exam 10: Buffer Overflow

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A consequence of a buffer overflow error is __________ .

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

D

Buffer overflow exploits are no longer a major source of concern to security practitioners.

Free
(True/False)
4.9/5
(40)
Correct Answer:
Verified

False

The _________ is typically located above the program code and global data and grows up in memory (while the sack grows down toward it).

Free
(Essay)
4.9/5
(33)
Correct Answer:
Verified

heap

A buffer overflow error is not likely to lead to eventual program termination.

(True/False)
4.9/5
(29)

Stack buffer overflow attacks were first seen in the Aleph One Worm.

(True/False)
4.8/5
(32)

The Packet Storm Web site includes a large collection of packaged shellcode,including code that can:

(Multiple Choice)
4.9/5
(32)

__________ is one of the best known protection mechanisms that is a GCC compiler extension that inserts additional function entry and exit code.

(Essay)
4.7/5
(32)

An attacker is more interested in transferring control to a location and code of the attacker's choosing rather than immediately crashing the program.

(True/False)
4.8/5
(23)

Shellcode is not specific to a particular processor architecture.

(True/False)
4.9/5
(40)

"Smashing the Stack for Fun and Profit" was a step by step introduction to exploiting stack-based buffer overflow vulnerabilities that was published in Phrack magazine by _________ .

(Essay)
4.9/5
(38)

_________ is a form of overflow attack.

(Multiple Choice)
4.9/5
(40)

A buffer _________ is a condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated,overwriting other information.

(Multiple Choice)
4.9/5
(34)

The function of ________ was to transfer control to a user command-line interpreter,which gave access to any program available on the system with the privileges of the attacked program.

(Multiple Choice)
4.8/5
(40)

To exploit any type of buffer overflow the attacker needs to identify a buffer overflow vulnerability in some program that can be triggered using externally sourced data under the attackers control.

(True/False)
4.9/5
(42)

In the classic __________ overflow,the attacker overwrites a buffer located in the local variable area of a stack frame and then overwrites the saved frame pointer and return address.

(Essay)
4.9/5
(29)

The __________ project produces a free,multiplatform 4.4BSD-based UNIX-like operating system.

(Essay)
4.8/5
(38)

The potential for a buffer overflow exists anywhere that data is copied or merged into a buffer,where at least some of the data are read from outside the program.

(True/False)
4.8/5
(40)

A stack buffer overflow is also referred to as ___________ .

(Multiple Choice)
4.8/5
(31)

Traditionally the function of __________ was to transfer control to a user command-line interpreter,which gave access to any program available on the system with the privileges of the attacked program.

(Multiple Choice)
4.8/5
(27)

Data is simply an array of _________ .

(Essay)
4.8/5
(39)
Showing 1 - 20 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)