in Education by
Why apps developed in languages like C, C++ is prone to Buffer-overflow? (a) No string boundary checks in predefined functions (b) No storage check in the external memory (c) No processing power check (d) No database check I have been asked this question in an interview for internship. The above asked question is from Buffer Overflow in portion Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct choice is (a) No string boundary checks in predefined functions For explanation I would say: The strcat(), strcpy(), sprintf(), gets() etc when called in C and C++ can be exploited because these functions don’t check whether the stack is large enough for storing the data fetched from some other variable holding larger data.

Related questions

0 votes
    Applications developed by programming languages like ____ and ______ have this common buffer-overflow error. (a) C, Ruby ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Buffer-overflow may remain as a bug in apps if __________ are not done fully. (a) boundary hacks (b) memory ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability. (a) Windows 7 ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    How many types of buffer-overflow attack are there? (a) 4 (b) 2 (c) 5 (d) 3 The question was posed to ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Buffer-overflow is also known as ______________ (a) buffer-overrun (b) buffer-leak (c) memory leakage (d) data ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment. (a ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    How many primary ways are there for detecting buffer-overflow? (a) 6 (b) 3 (c) 2 (d) 5 I have been ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Testing for buffer-overflow in a system can be done manually and has two possible ways. (a) True (b) False ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
0 votes
    _____________ buffer overflows, which are more common among attackers. (a) Memory-based (b) Queue-based (c) Stack ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
0 votes
    Adware are pre-chosen _______ developed to display ads. (a) banner (b) software (c) malware (d) shareware I ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Algorithm-Based Phishing was developed in the year __________ (a) 1988 (b) 1989 (c) 1990 (d) 1991 I ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    ______________ is a widespread app's coding mistake made by developers which could be exploited by an attacker for gaining ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
...