Exam 10: Buffer Overflow

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The __________ used a buffer overflow exploit in "fingerd" as one of its attack mechanisms.

(Multiple Choice)
4.8/5
(37)

The buffer overflow type of attack has been known since it was first widely used by the __________ Worm in 1988.

(Multiple Choice)
4.9/5
(33)

Buffer overflow attacks are one of the most common attacks seen.

(True/False)
4.8/5
(38)

__________ defenses aim to harden programs to resist attacks in new programs.

(Essay)
4.8/5
(34)
Showing 41 - 44 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)