Answer the following statements true (T) or false (F)

1. Even though it is a high-level programming language, Java still suffers from buffer overflows because it permits more data to be saved into a buffer than it has space for.
2. Stack buffer overflow attacks were first seen in the Aleph One Worm.
3. A stack overflow can result in some form of a denial-of-service attack on a system.
4. An attacker is more interested in transferring control to a location and code of the attacker’s choosing rather than immediately crashing the program.
5. The potential for a buffer overflow exists anywhere that data is copied or merged into a buffer, where at least some of the data are read from outside the program.


1. False
2. False
3. True
4. True
5. True

Computer Science & Information Technology

You might also like to view...

All of the following statements about aligning text are true EXCEPT:

A) Alignment with the right edge aligned and the left edge uneven is called right-aligned. B) Alignment is mainly used in the first line of a paragraph. C) When words are evenly aligned on the left, they are left-aligned. D) Center alignment places text in the center of the line.

Computer Science & Information Technology

Kelsey wants to create queries to answer management questions from a relational database she does not have much experience with.  Why might a Relationships report help her create the queries?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is NOT true of a Wi-Fi network?

A. Many home users set them up. B. A Wi-Fi's Internet service can be dial-up access. C. Wi-Fi networks send signals to a communications device that is connected to a high-speed Internet service. D. Many public locations are Wi-Fi hot spots.

Computer Science & Information Technology

James recently received a secret message from Martha containing an order for custom services. He would like to be able to prove that Martha sent the message and that is could not be forged. What cryptographic goal is James attempting to achieve?

a. Confidentiality b. Nonrepudiation c. Security though obscurity d. Integrity e. Authentication

Computer Science & Information Technology