1 / 4

Address space randomization helps prevent which components of buffer overflow attacks?

Address space randomization helps prevent which components of buffer overflow attacks? A: overwriting program variables B: hijacking the control flow C: executing arbitrary code. Non-executable stacks help prevent which component of buffer overflow attacks? A: overwriting program variables

teigra
Download Presentation

Address space randomization helps prevent which components of buffer overflow attacks?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Address space randomization helps prevent which components of buffer overflow attacks? • A: overwriting program variables • B: hijacking the control flow • C: executing arbitrary code

  2. Non-executable stacks help prevent which component of buffer overflow attacks? • A: overwriting program variables • B: hijacking the control flow • C: executing arbitrary code

  3. Return-to-libc is a countermeasure to foil which buffer overflow defense? • A: Address space randomization • B: Non-executable stack • C: libsafe

  4. If an IDS reports an attack when only benign actions occur, this is an example of a: • A: false positive • B: false negative • C: evasion

More Related