MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
WHY_APPS_DEVELOPED_IN_LANGUAGES_LIKE_C,_C++_IS_PRONE_TO_BUFFER-OVERFLOW??$ |
| A. | No string boundary checks in predefined functions |
| B. | No storage check in the external memory |
| C. | No processing power check |
| D. | No database check |
| Answer» B. No storage check in the external memory | |
| 2. |
Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability.$ |
| A. | Windows 7 |
| B. | Chrome |
| C. | IOS12 |
| D. | UNIX |
| Answer» E. | |
| 3. |
Applications developed by programming languages like ____ and ______ have this common buffer-overflow error? |
| A. | C, Ruby |
| B. | Python, Ruby |
| C. | C, C++ |
| D. | Tcl, C |
| Answer» D. Tcl, C | |
| 4. |
Buffer-overflow may remain as a bug in apps if __________ are not done fully. |
| A. | boundary hacks |
| B. | memory checks |
| C. | boundary checks |
| D. | buffer checks |
| Answer» D. buffer checks | |
| 5. |
Buffer-overflow is also known as ______________ |
| A. | buffer-overrun |
| B. | buffer-leak |
| C. | memory leakage |
| D. | data overflow |
| Answer» B. buffer-leak | |
| 6. |
______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system.$ |
| A. | Memory leakage |
| B. | Buffer-overrun |
| C. | Less processing power |
| D. | Inefficient programming |
| Answer» C. Less processing power | |
| 7. |
Let suppose a search box of an application can take at most 200 words, and you’ve inserted more than that and pressed the search button; the system crashes. Usually this is because of limited __________$ |
| A. | buffer |
| B. | external storage |
| C. | processing power |
| D. | local storage |
| Answer» B. external storage | |
| 8. |
How many types of buffer-overflow attack are there? |
| A. | 4 |
| B. | 2 |
| C. | 5 |
| D. | 3 |
| Answer» C. 5 | |
| 9. |
In a _____________ attack, the extra data that holds some specific instructions in the memory for actions is projected by a cyber-criminal or penetration tester to crack the system. |
| A. | Phishing |
| B. | MiTM |
| C. | Buffer-overflow |
| D. | Clickjacking |
| Answer» D. Clickjacking | |
| 10. |
A __________ is a sequential segment of the memory location that is allocated for containing some data such as a character string or an array of integers. |
| A. | stack |
| B. | queue |
| C. | external storage |
| D. | buffer |
| Answer» E. | |