in Education by
. In ___________ attack, malicious code is pushed into _______. 1.buffer-overflow, stack 2.buffer-overflow, queue 3.buffer-overflow,memory-card 4.buffer-overflow,external drive with reason!!!!!!! Select the correct answer from above options

1 Answer

0 votes
by
 
Best answer
Answer: Option 1 is correct answer Explanation: Malicious code can be pushed into the stack during the buffer-overflow attack. The overflow can be used to overwrite the return pointer so that the control-flow switches to the malicious code.

Related questions

0 votes
    Malicious code can be pushed into the _________ during ______________ attack. (a) stack, buffer-overflow (b) queue, ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability. (a) Windows 7 ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment. (a ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    How many types of buffer-overflow attack are there? (a) 4 (b) 2 (c) 5 (d) 3 The question was posed to ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which storage type is used in the modern digital cameras, mobile phones, Mp3 players etc..? A) Pendrive B) ... drive D) Floppy drive Select the correct answer from above options...
asked Dec 22, 2021 in Education by JackTerrance
0 votes
    _____ is a small, portable flash memory card that plugs into a computer’s USB port and functions as a portable hard drive ? 1. Flash drive 2. CD-RW 3. DVD-ROM 4. CD-ROM...
asked Jul 14, 2022 in Education by JackTerrance
0 votes
    Buffer-overflow is also known as ______________ (a) buffer-overrun (b) buffer-leak (c) memory leakage (d) data ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Buffer-overflow may remain as a bug in apps if __________ are not done fully. (a) boundary hacks (b) memory ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Applications developed by programming languages like ____ and ______ have this common buffer-overflow error. (a) C, Ruby ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Why apps developed in languages like C, C++ is prone to Buffer-overflow? (a) No string boundary checks in ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    How many primary ways are there for detecting buffer-overflow? (a) 6 (b) 3 (c) 2 (d) 5 I have been ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Testing for buffer-overflow in a system can be done manually and has two possible ways. (a) True (b) False ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    A memory byte location contains the pattern 00101100. What does this pattern represent when interpreted as a binary ... ASCII code? Select the correct answer from above options...
asked Nov 29, 2021 in Education by JackTerrance
...