Exam 10: Buffer Overflow
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Shellcode has to be __________, which means it cannot contain any absolute address referring to itself.
(Short Answer)
4.8/5
(31)
Buffer overflow attacks are one of the most common attacks seen.
(True/False)
4.9/5
(38)
Stack buffer overflow attacks were first seen in the Aleph One Worm.
(True/False)
4.9/5
(33)
The _________ is typically located above the program code and global data and grows up in memory (while the sack grows down toward it).
(Short Answer)
4.8/5
(30)
_________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred, but due to a coding error, allows just one more byte to be copied than there is space available.
(Short Answer)
4.9/5
(41)
__________ defenses aim to harden programs to resist attacks in new programs.
(Short Answer)
4.7/5
(35)
An attacker can generally determine in advance exactly where thetargeted buffer will be located in the stack frame of the function inwhich it is defined.
(True/False)
5.0/5
(39)
The Packet Storm Web site includes a large collection of packaged shellcode, including code that can:
(Multiple Choice)
4.8/5
(30)
In 2003 the _________ exploited a buffer overflow in Microsoft SQL Server 2000.
(Multiple Choice)
4.9/5
(33)
To exploit any type of buffer overflow the attacker needs to identify abuffer overflow vulnerability in some program that can be triggeredusing externally sourced data under the attackers control.
(True/False)
4.8/5
(31)
A buffer _________ is a condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information.
(Multiple Choice)
4.8/5
(38)
Shellcode must be able to run no matter where in memory it islocated.
(True/False)
4.8/5
(39)
Traditionally the function of __________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program.
(Multiple Choice)
4.8/5
(39)
__________ is one of the best known protection mechanisms that is a GCC compiler extension that inserts additional function entry and exit code.
(Short Answer)
4.9/5
(32)
An essential component of many buffer overflow attacks is the transfer of execution to code supplied by the attacker and often saved in the buffer being overflowed. This code is known as _________ .
(Short Answer)
4.8/5
(39)
The potential for a buffer overflow exists anywhere that data is copiedor merged into a buffer, where at least some of the data are read fromoutside the program.
(True/False)
4.8/5
(30)
Buffer overflow exploits are no longer a major source of concern tosecurity practitioners.
(True/False)
4.8/5
(32)
A stack buffer overflow is also referred to as ___________ .
(Multiple Choice)
5.0/5
(28)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)