in Education by
Malicious code can be pushed into the _________ during ______________ attack. (a) stack, buffer-overflow (b) queue, buffer-overflow (c) memory-card, buffer-overflow (d) external drive, buffer-overflow The question was posed to me by my school teacher while I was bunking the class. The query is from Buffer Overflow topic in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right answer is (a) stack, buffer-overflow The best explanation: Malicious code can be pushed into the stack during the buffer-overflow attack. The overflow can be used to overwrite the return pointer so that the control-flow switches to the malicious code.

Related questions

0 votes
    A computer ________ is a malicious code which self-replicates by copying itself to other programs. (a) ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following scripting language is used for injecting executable malicious code for web-app hacking? ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment. (a ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Malicious adware may sneak into your system by __________ different ways. (a) five (b) four (c) three ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Through the clickjacking attack, the employee's confidential ______________ may get leaked or stolen. (a) information (b) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Brute force attack is ______________ (a) fast (b) inefficient (c) slow (d) complex to understand This ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Trojan-Downloader is a special type of trojans which can download & install new versions of malicious programs ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    _________________ can be alternatively termed as password guessing attack. (a) passive online (b) active online ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In _____________ sniffing, the network traffic is not only supervised & locked but also be can be altered ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
...