Information Security In-Class Quiz 2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:58 AM on 4/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

14 Terms

1
New cards

Buffer Overflow is one of the most common security vulnerabilities in software

True

2
New cards

Buffer Overflow

A condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information

3
New cards

How can attackers exploit buffer overflow?

Attackers can use it to crash a system or insert specially crafted code to gain control to the system

4
New cards

Common and Moderate Impact of Buffer Overflow

Denial of Service

5
New cards

Common and Critical Impact of Buffer Overlow

Remote Code Execution

6
New cards

Static data (compile time) used by user program is stored in ______

Global Data Segment

7
New cards

Dynamic data (data allocated at run-time) used by user program in stored in ______

Heap

8
New cards

Stack

  • Used by user program to store temporary data, like subroutine calls

  • Stores local variables created by each function

  • Function calls

9
New cards

Kernel Segment

Stores kernel level code and static data used by the kernel

10
New cards

What is a frame?

A chunk of data for a given function

11
New cards

ebp (stack base)

Start of current frame

12
New cards

esp (stack pointer)

End of current frame

13
New cards

eip (instruction pointer)

Next instruction

14
New cards

Where does attack want to insert malicious code?

at pointer/ return address ret (main), before ebp