Matching
Match each item with a statement below:
Premises:
detect any attempt to run illegal code on the stack
an extremely common security flaw in C/C++
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
a set of programming language compilers produced by the GNU Project
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
holds all dynamic variables allocated by malloc() and the new operator
used to store program state such as procedure arguments, local variables, and register values
used as a tool to write software programs that interact well with the operating system
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Responses:
GCC
Library-based defenses
C
AES
Buffer overflow
Base64
Electric Fence
Stack
Heap
Correct Answer:
Premises:
Responses:
detect any attempt to run illegal code on the stack
an extremely common security flaw in C/C++
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
a set of programming language compilers produced by the GNU Project
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
holds all dynamic variables allocated by malloc() and the new operator
used to store program state such as procedure arguments, local variables, and register values
used as a tool to write software programs that interact well with the operating system
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Premises:
detect any attempt to run illegal code on the stack
an extremely common security flaw in C/C++
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
a set of programming language compilers produced by the GNU Project
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
holds all dynamic variables allocated by malloc() and the new operator
used to store program state such as procedure arguments, local variables, and register values
used as a tool to write software programs that interact well with the operating system
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Responses:
Related Questions
Q32: How can you revoke a certificate in
Q33: Describe the structure of a configuration file
Q34: How does hashing work?
Q35: _ are usually used in conjunction with
Q36: The open source toolkit _ is the
Q37: _ is a block cipher designed by
Q38: _ helps to insure the security and
Q39: What is the core path for hashing
Q40: Most block ciphers are constructed by composing
Q42: Briefly describe DES and its variants.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents