- C, Ruby
 - C, C++
 - Python, Ruby
 - C, Python
 - Note:- C and C++ languages because they expose low level representational details of buffers as containers for data types..
 - Q2) Which type of buffer overflows are common among attackers ?
 
- Memory-based
 - Queue-based
 - Stack-based
 - Heap-based
 - Note:- Stack-based buffer overflows, which are more common among attackers, exploit applications and programs by using what is known as a stack, the memory space used to store user input.
 
Q:3. In _________ attack, malicious code is pushed into ______.
- buffer-overflow, stack
 - buffer-overflow, queue
 - buffer-overflow,memory-card
 - buffer-overflow,external drive
 
Note:- Malicious code can be pushed into the stack during the buffer-overflow attack. The overflow can be used to overwrite the return pointer so that the control-flow switches to the malicious code.
Q4) In case of integer overflow, Which of the following option/s is/are true ?
- It is a result of an attempt to store a value greater than the maximum value an integer can store
 - Integer overflow can compromise a program's reliability and security
 - Both A and B
 - None of the above
 
Note:- In case of integer overflow, so It is a result of an attempt to store a value greater than the maximum value an integer can store and Integer overflow can compromise a program's reliability and security is are true .
Q5) A string which contains ___________ parameter/s, is called ______ string.
- Format, text
 - Text, format
 - text and format, format
 - None of the above
 
Note:- A string Which contains Text parameter/s is called Format string.

No comments :
Post a Comment