exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 78 discussion

Actual exam question from Isaca's CISM
Question #: 78
Topic #: 1
[All CISM Questions]

Which of the following BEST describes a buffer overflow?

  • A. A type of covert channel that captures data
  • B. A function is carried out with more data than the function can handle
  • C. Malicious code designed to interfere with normal operations
  • D. A program contains a hidden and unintended function that presents a security risk
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Viperhunter
3 months, 3 weeks ago
Selected Answer: B
A buffer overflow occurs when a program writes more data to a block of memory, or buffer, than it was allocated to hold. This can lead to overwriting adjacent memory areas, potentially causing unpredictable behavior, crashes, or security vulnerabilities. In the context of security, attackers may exploit buffer overflows to execute arbitrary code, inject malicious payloads, or compromise the integrity of the affected system.
upvoted 3 times
...
richck102
10 months ago
Selected Answer: B
B. A function is carried out with more data than the function can handle
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago