Matching
Match each item with a statement below:
Premises:
detect any attempt to run illegal code on the stack
an extremely common security flaw in C/C++
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
a set of programming language compilers produced by the GNU Project
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
holds all dynamic variables allocated by malloc() and the new operator
used to store program state such as procedure arguments, local variables, and register values
used as a tool to write software programs that interact well with the operating system
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Responses:
GCC
Library-based defenses
C
AES
Buffer overflow
Base64
Electric Fence
Stack
Heap
Correct Answer:
Premises:
Responses:
detect any attempt to run illegal code on the stack
an extremely common security flaw in C/C++
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
a set of programming language compilers produced by the GNU Project
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
holds all dynamic variables allocated by malloc() and the new operator
used to store program state such as procedure arguments, local variables, and register values
used as a tool to write software programs that interact well with the operating system
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Premises:
detect any attempt to run illegal code on the stack
an extremely common security flaw in C/C++
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
a set of programming language compilers produced by the GNU Project
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
holds all dynamic variables allocated by malloc() and the new operator
used to store program state such as procedure arguments, local variables, and register values
used as a tool to write software programs that interact well with the operating system
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Responses:
Related Questions
Q32: A language is _ typed if it
Q33: How does hashing work?
Q34: _ is a specific type of stack
Q35: _ are usually used in conjunction with
Q36: How can you revoke a certificate in
Q37: _ is a protocol that provides a
Q38: Why is it hard to write secure
Q40: The _ command is a PKCS#10 certificate
Q41: _ is the mathematical process that produces
Q42: The open source toolkit _ is the