Info Sec Quizzes

Info Sec Quizzes

University

55 Qs

quiz-placeholder

Similar activities

Networking 1 Module 1 - 4

Networking 1 Module 1 - 4

University

55 Qs

UAS Sistem Basis Data

UAS Sistem Basis Data

University

50 Qs

NET1L - Lesson 3 (Protocol Suites Pt. 2)

NET1L - Lesson 3 (Protocol Suites Pt. 2)

University

55 Qs

Lesson 3 - Operating System Structures

Lesson 3 - Operating System Structures

University

51 Qs

System Security

System Security

University

60 Qs

Module 8

Module 8

University

51 Qs

Module 11

Module 11

University

51 Qs

MidExam InfoAssuSec2

MidExam InfoAssuSec2

University

50 Qs

Info Sec Quizzes

Info Sec Quizzes

Assessment

Quiz

Computers

University

Easy

Used 1+ times

FREE Resource

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Data breach is one that ex-filtrates large amounts of data that was sensitive and stored on some server?

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Overflowing a global variable is considered a stack overflow.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A good example of a strongly typed language would be C.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In regards to overflow exploits, you only need to worry about “ints” not “strings”.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A “Canary Value” is used is used in the stack frame to keep track of overflow detection.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A compiler can determine and stop programs from run time buffer overflows before they occur.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A programmer can tell the operating system to not allow programs to overflow memory.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?