

MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
WHY_APPS_DEVELOPED_IN_LANGUAGES_LIKE_C,_C++_IS_PRONE_TO_BUFFER-OVERFLOW??$ |
A. | No string boundary checks in predefined functions |
B. | No storage check in the external memory |
C. | No processing power check |
D. | No database check |
Answer» B. No storage check in the external memory | |
2. |
Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability.$ |
A. | Windows 7 |
B. | Chrome |
C. | IOS12 |
D. | UNIX |
Answer» E. | |
3. |
Applications developed by programming languages like ____ and ______ have this common buffer-overflow error? |
A. | C, Ruby |
B. | Python, Ruby |
C. | C, C++ |
D. | Tcl, C |
Answer» D. Tcl, C | |
4. |
Buffer-overflow may remain as a bug in apps if __________ are not done fully. |
A. | boundary hacks |
B. | memory checks |
C. | boundary checks |
D. | buffer checks |
Answer» D. buffer checks | |
5. |
Buffer-overflow is also known as ______________ |
A. | buffer-overrun |
B. | buffer-leak |
C. | memory leakage |
D. | data overflow |
Answer» B. buffer-leak | |
6. |
______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system.$ |
A. | Memory leakage |
B. | Buffer-overrun |
C. | Less processing power |
D. | Inefficient programming |
Answer» C. Less processing power | |
7. |
Let suppose a search box of an application can take at most 200 words, and you’ve inserted more than that and pressed the search button; the system crashes. Usually this is because of limited __________$ |
A. | buffer |
B. | external storage |
C. | processing power |
D. | local storage |
Answer» B. external storage | |
8. |
How many types of buffer-overflow attack are there? |
A. | 4 |
B. | 2 |
C. | 5 |
D. | 3 |
Answer» C. 5 | |
9. |
In a _____________ attack, the extra data that holds some specific instructions in the memory for actions is projected by a cyber-criminal or penetration tester to crack the system. |
A. | Phishing |
B. | MiTM |
C. | Buffer-overflow |
D. | Clickjacking |
Answer» D. Clickjacking | |
10. |
A __________ is a sequential segment of the memory location that is allocated for containing some data such as a character string or an array of integers. |
A. | stack |
B. | queue |
C. | external storage |
D. | buffer |
Answer» E. | |