Information Security Uk11

Information Security Uk11

University

10 Qs

quiz-placeholder

Similar activities

CyberSecurity Pertemuan ke-5

CyberSecurity Pertemuan ke-5

University

13 Qs

Monday Week#2

Monday Week#2

University

15 Qs

Administrasi Server Jaringan

Administrasi Server Jaringan

12th Grade - University

15 Qs

Input Output File

Input Output File

University

10 Qs

Anime

Anime

KG - University

10 Qs

Human Computer Interaction (HCI)

Human Computer Interaction (HCI)

University

15 Qs

cybercrime

cybercrime

12th Grade - University

10 Qs

Information Security Uk11

Information Security Uk11

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Udhayakumar Shanmugam

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Buffer overflow and Overreads are types of ....................................................program flaws

Application software

System Software

Peripherials

Hardware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..........................................occurs when the data is written outside the boundary of the allocated memory

Buffer Overflow

Integer Overflow

Memory Underflow

Stack Overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Spawning a shell" generally means ............................................................

creating a new interactive shell process.

creating a new directory

Deleting a Shell program

Moving a shell from one place to another

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

............................................. are known values that are placed between a buffer and control data on the stack to monitor buffer overflows.

Stack Canaries

Stack Burfies

Stack Pointers

Stack Shell

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.................................................. is also a GNU C compiler extension that protects the return address. When a function is called it copies away the return address to a non-overflowable area, and restores the return address upon returning from a function.

StackShield

StackCanary

StackOVerflow

StackPointer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Heartbleed is a security vulnerability in the............................................ cryptography library carried out through the TLS heartbeat extension. Google Security first discovered this bug in 2014.

OpenSSL

OpenAI

OpenSSH

OpenSOC

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clickjacking, Cross-site scripting (XSS) is which type of attack

Client Side Attack

Server Side Attack

Database Side Attack

Network Attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers