Buffer Overflow Questions and Answers

Buffer Overflow 

Cyber Security Questions and Answers – Buffer Overflow

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Buffer Overflow

1. Let suppose a search box of an application can take at most 200 words, and you’ve inserted more than that and pressed the search button; the system crashes. Usually this is because of limited __________
a) buffer
b) external storage
c) processing power
d) local storage

2. ______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system.
a) Memory leakage
b) Buffer-overrun
c) Less processing power
d) Inefficient programming

3. Buffer-overflow is also known as ______________
a) buffer-overrun
b) buffer-leak
c) memory leakage
d) data overflow

4. Buffer-overflow may remain as a bug in apps if __________ are not done fully.
a) boundary hacks
b) memory checks
c) boundary checks
d) buffer checks

5. Applications developed by programming languages like ____ and ______ have this common buffer-overflow error.
a) C, Ruby
b) Python, Ruby
c) C, C++
d) Tcl, C#

6. Why apps developed in languages like C, C++ is prone to Buffer-overflow?
a) No string boundary checks in predefined functions
b) No storage check in the external memory
c) No processing power check
d) No database check

7. Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability.
a) Windows 7
b) Chrome
c) IOS12
d) UNIX

8. A __________ is a sequential segment of the memory location that is allocated for containing some data such as a character string or an array of integers.
a) stack
b) queue
c) external storage
d) buffer

9. In a _____________ attack, the extra data that holds some specific instructions in the memory for actions is projected by a cyber-criminal or penetration tester to crack the system.
a) Phishing
b) MiTM
c) Buffer-overflow
d) Clickjacking

10. How many types of buffer-overflow attack are there?
a) 4
b) 2
c) 5
d) 3

When the volume of data exceeds the memory buffer’s storage capacity, a buffer overflow (or buffer overrun) occurs. All forms of software can be affected by buffer overflows. Malformed inputs or a failure to allocate enough buffer space are the most common causes. An exploit that takes advantage of a programme that receives input from a client or another software process is known as a buffer overflow. It happens when a programme or process tries to write more data to a fixed-length memory block, or buffer, than the buffer can retain.

Leave a Reply

Your email address will not be published.