Explore topic-wise MCQs in Cyber Security.

This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

WHY_APPS_DEVELOPED_IN_LANGUAGES_LIKE_C,_C++_IS_PRONE_TO_BUFFER-OVERFLOW??$

A. No string boundary checks in predefined functions
B. No storage check in the external memory
C. No processing power check
D. No database check
Answer» B. No storage check in the external memory
2.

Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability.$

A. Windows 7
B. Chrome
C. IOS12
D. UNIX
Answer» E.
3.

Applications developed by programming languages like ____ and ______ have this common buffer-overflow error?

A. C, Ruby
B. Python, Ruby
C. C, C++
D. Tcl, C
Answer» D. Tcl, C
4.

Buffer-overflow may remain as a bug in apps if __________ are not done fully.

A. boundary hacks
B. memory checks
C. boundary checks
D. buffer checks
Answer» D. buffer checks
5.

Buffer-overflow is also known as ______________

A. buffer-overrun
B. buffer-leak
C. memory leakage
D. data overflow
Answer» B. buffer-leak
6.

______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system.$

A. Memory leakage
B. Buffer-overrun
C. Less processing power
D. Inefficient programming
Answer» C. Less processing power
7.

Let suppose a search box of an application can take at most 200 words, and you’ve inserted more than that and pressed the search button; the system crashes. Usually this is because of limited __________$

A. buffer
B. external storage
C. processing power
D. local storage
Answer» B. external storage
8.

How many types of buffer-overflow attack are there?

A. 4
B. 2
C. 5
D. 3
Answer» C. 5
9.

In a _____________ attack, the extra data that holds some specific instructions in the memory for actions is projected by a cyber-criminal or penetration tester to crack the system.

A. Phishing
B. MiTM
C. Buffer-overflow
D. Clickjacking
Answer» D. Clickjacking
10.

A __________ is a sequential segment of the memory location that is allocated for containing some data such as a character string or an array of integers.

A. stack
B. queue
C. external storage
D. buffer
Answer» E.