adplus-dvertising
frame-decoration

Question

______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system.

a.

Memory leakage

b.

Buffer-overrun

c.

Less processing power

d.

Inefficient programming

Answer: (b).Buffer-overrun

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. ______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system.

Similar Questions

Discover Related MCQs

Q. Buffer-overflow is also known as ______________

Q. Buffer-overflow may remain as a bug in apps if __________ are not done fully.

Q. Applications developed by programming languages like ____ and ______ have this common buffer-overflow error.

Q. Why apps developed in languages like C, C++ is prone to Buffer-overflow?

Q. Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability.

Q. Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment.

Q. Among the two types ____________buffer-overflow is complex to execute and the least common attack that may take place.

Q. _____________ buffer overflows, which are more common among attackers.

Q. With the lack of boundary check, the program ends abnormally and leads to ___________ error.

Q. In an application that uses heap, the memory for data is allocated ____________

Q. In an application that uses stack, the memory for data is allocated ____________

Q. Malicious code can be pushed into the _________ during ______________ attack.

Q. Variables that gets created dynamically when a function (such as malloc()) is called is created in the form of _______ data-structure.

Q. How many primary ways are there for detecting buffer-overflow?

Q. Testing for buffer-overflow in a system can be done manually and has two possible ways.

Q. Attackers commonly target ____________ for fetching IP address of a target or victim user.

Q. Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers.

Q. What common web scripting languages are used by attackers to fetch various details from its surfing users?

Q. ______________ is the first phase of ethical hacking.

Q. Enumeration is done to gain information. Which of the following cannot be achieved using enumeration?