Filters
Question type

Study Flashcards

A ________ is a condition where more input is placed into a buffer or data holding area than the capacity allocated and thus overwrites other information.

Correct Answer

verifed

verified

buffer ove...

View Answer

The JAVA programming language is extremely vulnerable to buffer overflows.

Correct Answer

verifed

verified

The _________ project produces a free,multiplatform 4.4BSD-based UNIX-like operating system.

Correct Answer

verifed

verified

The possibility of overwriting the saved frame pointer and return address forms the core of a stack overflow attack.

Correct Answer

verifed

verified

Randomizing the allocation of memory on the heap makes the possibility of predicting the address of targeted buffers extremely difficult,thus thwarting the successful execution of some __________ attacks.


A) vulnerability
B) heap overflow
C) MMU
D) stack overflow

Correct Answer

verifed

verified

The x86 Assembly Language Instruction NOP means _______.


A) no operation or do nothing instruction
B) call function at addr
C) software interrupt to access operating system function
D) no push value onto the stack

Correct Answer

verifed

verified

A

Memory is requested from the ______ by programs for use in dynamic data structures,such as linked lists of records.


A) shell
B) heap
C) address space
D) ROM

Correct Answer

verifed

verified

A _______ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer.


A) shellcode
B) program overflow
C) buffer overflow
D) library function

Correct Answer

verifed

verified

Stackshield,Return Address Defender and ________ are GCC compiler extensions that insert additional function entry and exit code.

Correct Answer

verifed

verified

Stackguard

_______ defenses involve changes to the memory management of the virtual address space of processes that act to either alter the properties of regions of memory or to make predicting the location of target buffers sufficiently difficult to thwart many types of attacks.


A) Buffer
B) Position independent
C) Run-time
D) Compile-time

Correct Answer

verifed

verified

C

The _______ exploited a buffer overflow in Microsoft SQL Server 2000.


A) Morris Internet Worm
B) Code Red Worm
C) Sasser Worm
D) Slammer Worm

Correct Answer

verifed

verified

The attacker can specify the return address used to enter code as a location somewhere in the run of NOPs,which is called a NOP ______.

Correct Answer

verifed

verified

The only consequence of a buffer overflow attack is the possible corruption of data used by the program.

Correct Answer

verifed

verified

In 1996 ________ published "Smashing the Stack for Fun and Profit" in Phrack magazine,giving a step-by-step introduction to exploiting stack-based buffer overflow vulnerabilities.

Correct Answer

verifed

verified

Shellcode is not specific to a particular processor architecture.

Correct Answer

verifed

verified

________ involve buffers located in the program's global (or static) data area.


A) Heap overflows
B) Stack buffer overflows
C) Position overflows
D) Global Data Area Overflows

Correct Answer

verifed

verified

A runtime technique that can be used is to place ________ between critical regions of memory in a processes address space.


A) guard pages
B) library functions
C) shellcodes
D) MMUs

Correct Answer

verifed

verified

A _________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-sized buffer and consequently overwrites adjacent memory locations.

Correct Answer

verifed

verified

A _______ overflow occurs when the targeted buffer is located on the stack,usually as a local variable in a function's stack frame.

Correct Answer

verifed

verified

Buffer overflow attacks result from careless programming in applications.

Correct Answer

verifed

verified

Showing 1 - 20 of 45

Related Exams

Show Answer