in Education by
Variables that gets created dynamically when a function (such as malloc()) is called is created in the form of _______ data-structure. (a) array (b) queue (c) stack (d) heap This question was posed to me during an internship interview. My enquiry is from Buffer Overflow in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct choice is (d) heap To explain I would say: Variables that gets created dynamically when a function (such as malloc()) is called is created in the form of heap data-structure. In heap-based overflow, the buffer is placed on the lower part of the heap, overwriting all dynamically generated variables.

Related questions

0 votes
    Data integrity gets compromised when _____ and _____ are taken control off. (a) Access control, file deletion (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    ________ is an attack technique occurs when excess data gets written to a memory block. (a) Over buffering (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    A __________ is a sequential segment of the memory location that is allocated for containing some data such as a ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    The full form of EDR is _______ (a) Endpoint Detection and recovery (b) Early detection and response (c) Endpoint ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    When you book online tickets by swiping your card, the details of the card gets stored in ______ (a) database ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
0 votes
    One who disclose information to public of a company, organization, firm, government and private agency and he/she is ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________ (a) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Existence of weakness in a system or network is called _______ (a) Threat (b) Vulnerability (c) Exploit (d) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    A _______________ is a program application which is stored on a remote-server & distributed over the Internet ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
...