in Education by
Among the two types ____________buffer-overflow is complex to execute and the least common attack that may take place. (a) memory-based (b) queue-based (c) stack-based (d) heap-based This question was addressed to me during a job interview. The doubt is from Buffer Overflow in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right option is (d) heap-based Easy explanation: Among the two types of buffer-overflow, heap-based buffer-overflow attacks are hard to execute and the least common of the 2 types. It attacks the application by flooding the space of memory that is reserved for a program.

Related questions

0 votes
    Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment. (a ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability. (a) Windows 7 ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    How many types of buffer-overflow attack are there? (a) 4 (b) 2 (c) 5 (d) 3 The question was posed to ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Applications developed by programming languages like ____ and ______ have this common buffer-overflow error. (a) C, Ruby ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Buffer-overflow may remain as a bug in apps if __________ are not done fully. (a) boundary hacks (b) memory ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place. (a) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Mobile Phone OS contains open APIs that may be _____________ attack. (a) useful for (b) vulnerable to (c ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In _______________ attack, the attacker doesn't actively take over another user to perform the attack. (a) ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Through the clickjacking attack, the employee's confidential ______________ may get leaked or stolen. (a) information (b) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which among the following is the least strong security encryption standard? (a) WEP (b) WPA (c) WPA2 ( ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Testing for buffer-overflow in a system can be done manually and has two possible ways. (a) True (b) False ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    _____________ buffer overflows, which are more common among attackers. (a) Memory-based (b) Queue-based (c) Stack ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    There are ______ types of DoS attack. (a) 2 (b) 3 (c) 4 (d) 5 The question was posed to me ... Security?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
...