- C, Ruby
- C, C++
- Python, Ruby
- C, Python
- Note:- C and C++ languages because they expose low level representational details of buffers as containers for data types..
- Q2) Which type of buffer overflows are common among attackers ?
- Memory-based
- Queue-based
- Stack-based
- Heap-based
- Note:- Stack-based buffer overflows, which are more common among attackers, exploit applications and programs by using what is known as a stack, the memory space used to store user input.
Q:3. In _________ attack, malicious code is pushed into ______.
- buffer-overflow, stack
- buffer-overflow, queue
- buffer-overflow,memory-card
- buffer-overflow,external drive
Note:- Malicious code can be pushed into the stack during the buffer-overflow attack. The overflow can be used to overwrite the return pointer so that the control-flow switches to the malicious code.
Q4) In case of integer overflow, Which of the following option/s is/are true ?
- It is a result of an attempt to store a value greater than the maximum value an integer can store
- Integer overflow can compromise a program's reliability and security
- Both A and B
- None of the above
Note:- In case of integer overflow, so It is a result of an attempt to store a value greater than the maximum value an integer can store and Integer overflow can compromise a program's reliability and security is are true .
Q5) A string which contains ___________ parameter/s, is called ______ string.
- Format, text
- Text, format
- text and format, format
- None of the above
Note:- A string Which contains Text parameter/s is called Format string.
No comments :
Post a Comment