InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Testing for buffer-overflow in a system can be done manually and has two possible ways.(a) True(b) FalseI have been asked this question in exam.I would like to ask this question from Buffer Overflow in section Cyber Security of Cyber Security |
|
Answer» The correct answer is (a) True |
|
| 2. |
How many primary ways are there for detecting buffer-overflow?(a) 6(b) 3(c) 2(d) 5I have been asked this question in semester exam.Query is from Buffer Overflow in division Cyber Security of Cyber Security |
|
Answer» The correct CHOICE is (c) 2 |
|
| 3. |
Variables that gets created dynamically when a function (such as malloc()) is called is created in the form of _______ data-structure.(a) array(b) queue(c) stack(d) heapThis question was posed to me during an internship interview.My enquiry is from Buffer Overflow in section Cyber Security of Cyber Security |
|
Answer» Correct choice is (d) heap |
|
| 4. |
Malicious code can be pushed into the _________ during ______________ attack.(a) stack, buffer-overflow(b) queue, buffer-overflow(c) memory-card, buffer-overflow(d) external drive, buffer-overflowThe question was posed to me by my school teacher while I was bunking the class.The query is from Buffer Overflow topic in section Cyber Security of Cyber Security |
|
Answer» Right answer is (a) stack, buffer-overflow |
|
| 5. |
In an application that uses stack, the memory for data is allocated ____________(a) logical(b) dynamically(c) statically(d) at the end of the programThis question was posed to me in my homework.Question is taken from Buffer Overflow topic in portion Cyber Security of Cyber Security |
|
Answer» Right option is (c) statically |
|
| 6. |
In an application that uses heap, the memory for data is allocated ____________(a) logical(b) dynamically(c) statically(d) at the beginning of the programThe question was posed to me in semester exam.I want to ask this question from Buffer Overflow in division Cyber Security of Cyber Security |
|
Answer» Right option is (b) dynamically |
|
| 7. |
With the lack of boundary check, the program ends abnormally and leads to ___________ error.(a) logical(b) segmentation(c) compile-time(d) syntaxI had been asked this question in my homework.Origin of the question is Buffer Overflow in section Cyber Security of Cyber Security |
|
Answer» The correct option is (b) segmentation |
|
| 8. |
_____________ buffer overflows, which are more common among attackers.(a) Memory-based(b) Queue-based(c) Stack-based(d) Heap-basedThe question was posed to me in an internship interview.I want to ask this question from Buffer Overflow in division Cyber Security of Cyber Security |
|
Answer» Correct choice is (C) Stack-based |
|
| 9. |
Among the two types ____________buffer-overflow is complex to execute and the least common attack that may take place.(a) memory-based(b) queue-based(c) stack-based(d) heap-basedThis question was addressed to me during a job interview.The doubt is from Buffer Overflow in section Cyber Security of Cyber Security |
|
Answer» Right option is (d) heap-based |
|
| 10. |
Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment.(a) True(b) FalseI have been asked this question in final exam.Question is taken from Buffer Overflow in section Cyber Security of Cyber Security |
|
Answer» RIGHT answer is (a) True Easy EXPLANATION: Buffer-overflow attack can TAKE PLACE either the programmer LACK boundary testing or if a machine can execute a code that resides in the data/stack segment. |
|
| 11. |
Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability.(a) Windows 7(b) Chrome(c) IOS12(d) UNIXI got this question during a job interview.I want to ask this question from Buffer Overflow in section Cyber Security of Cyber Security |
|
Answer» Right option is (d) UNIX |
|
| 12. |
Why apps developed in languages like C, C++ is prone to Buffer-overflow?(a) No string boundary checks in predefined functions(b) No storage check in the external memory(c) No processing power check(d) No database checkI have been asked this question in an interview for internship.The above asked question is from Buffer Overflow in portion Cyber Security of Cyber Security |
|
Answer» Correct choice is (a) No string boundary checks in predefined functions |
|
| 13. |
Applications developed by programming languages like ____ and______ have this common buffer-overflow error.(a) C, Ruby(b) Python, Ruby(c) C, C++(d) Tcl, C#I got this question during an online exam.I'm obligated to ask this question of Buffer Overflow topic in portion Cyber Security of Cyber Security |
|
Answer» Right choice is (c) C, C++ |
|
| 14. |
Buffer-overflow may remain as a bug in apps if __________ are not done fully.(a) boundary hacks(b) memory checks(c) boundary checks(d) buffer checksThis question was posed to me in exam.Query is from Buffer Overflow in chapter Cyber Security of Cyber Security |
|
Answer» The correct choice is (c) BOUNDARY checks |
|
| 15. |
Buffer-overflow is also known as ______________(a) buffer-overrun(b) buffer-leak(c) memory leakage(d) data overflowI got this question by my college professor while I was bunking the class.I want to ask this question from Buffer Overflow topic in portion Cyber Security of Cyber Security |
|
Answer» Right choice is (a) buffer-overrun |
|
| 16. |
______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system.(a) Memory leakage(b) Buffer-overrun(c) Less processing power(d) Inefficient programmingI got this question in an online interview.This is a very interesting question from Buffer Overflow in chapter Cyber Security of Cyber Security |
|
Answer» Right OPTION is (b) Buffer-overrun |
|
| 17. |
Let suppose a search box of an application can take at most 200 words, and you’ve inserted more than that and pressed the search button; the system crashes. Usually this is because of limited __________(a) buffer(b) external storage(c) processing power(d) local storageI have been asked this question during an online exam.I'd like to ask this question from Buffer Overflow topic in chapter Cyber Security of Cyber Security |
|
Answer» CORRECT option is (a) buffer The best I can explain: In a scenario, where to suppose a search box of an application can take at most 200 words, and you’ve inserted more than that and pressed the search BUTTON; the system crashes. USUALLY, this is because of the LIMITED buffer. |
|
| 18. |
How many types of buffer-overflow attack are there?(a) 4(b) 2(c) 5(d) 3The question was posed to me in my homework.The origin of the question is Buffer Overflow topic in chapter Cyber Security of Cyber Security |
|
Answer» CORRECT choice is (b) 2 The EXPLANATION is: There are two different types of buffer-overflow attack. These are stack-based and heap-based buffer overflow. In both the cases, this type of exploit takes advantage of an APPLICATION that WAITS for USER’s input. |
|
| 19. |
In a _____________ attack, the extra data that holds some specific instructions in the memory for actions is projected by a cyber-criminal or penetration tester to crack the system.(a) Phishing(b) MiTM(c) Buffer-overflow(d) ClickjackingThis question was posed to me in my homework.This interesting question is from Buffer Overflow in division Cyber Security of Cyber Security |
|
Answer» Correct ANSWER is (c) Buffer-overflow |
|
| 20. |
A __________ is a sequential segment of the memory location that is allocated for containing some data such as a character string or an array of integers.(a) stack(b) queue(c) external storage(d) bufferI got this question in examination.The question is from Buffer Overflow topic in chapter Cyber Security of Cyber Security |
|
Answer» Right choice is (d) BUFFER |
|