in Education by
How many primary ways are there for detecting buffer-overflow? (a) 6 (b) 3 (c) 2 (d) 5 I have been asked this question in semester exam. Query is from Buffer Overflow in division Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct choice is (c) 2 Easy explanation: There are two ways to detect buffer-overflow in an application. One way is to look into the code and check whether the boundary check has been properly incorporated or not. The other way is to make the executable build of the product, feed the application with a huge amount of data and check for abnormal behaviour.

Related questions

0 votes
    How many types of buffer-overflow attack are there? (a) 4 (b) 2 (c) 5 (d) 3 The question was posed to ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Testing for buffer-overflow in a system can be done manually and has two possible ways. (a) True (b) False ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Buffer-overflow may remain as a bug in apps if __________ are not done fully. (a) boundary hacks (b) memory ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Buffer-overflow is also known as ______________ (a) buffer-overrun (b) buffer-leak (c) memory leakage (d) data ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Applications developed by programming languages like ____ and ______ have this common buffer-overflow error. (a) C, Ruby ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Why apps developed in languages like C, C++ is prone to Buffer-overflow? (a) No string boundary checks in ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability. (a) Windows 7 ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment. (a ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    There are _______ major ways of stealing email information. (a) 2 (b) 3 (c) 4 (d) 5 I have ... Security?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    There are ___________ major ways of spamming. (a) 4 (b) 2 (c) 3 (d) 5 I have been asked this ... Security?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    How many basic elements are there for OS fingerprinting? (a) 2 (b) 3 (c) 4 (d) 5 I had been asked ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of them is not a powerful vulnerability detecting tool? (a) Nessus (b) Nexpose (c) Metasploit (d) Nmap ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    The antivirus or PC defender software in a system helps in detecting virus and Trojans. (a) True (b) False I ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    How many basic processes or steps are there in ethical hacking? (a) 4 (b) 5 (c) 6 (d) 7 This question ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    How many types of fingerprinting are there in ethical hacking? (a) 5 (b) 4 (c) 3 (d) 2 I have been ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
...