ISC Exam Questions

Which of the following BEST describes an exploit?

Which of the following BEST describes an exploit?

A.
An intentional hidden message or feature in an object such as a piece of software or a movie.

B.
A chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to
cause unintended or unanticipated behavior to occur on computer software.

C.
An anomalous condition where a process attempts to store data beyond the boundaries of a fixed-length
buffer.

D.
A condition where a program (either an application or part of the operating system) stops performing its
expected function and also stops responding to other parts of the system.

Explanation:
An exploit refers to a piece of software or data, or a sequence of commands that takes advantage of a bug or
vulnerability with the aim of causing unplanned or unexpected behavior to take place on computerized
hardware, or its software.
Incorrect Answers:
A: An intentional hidden message, in-joke, or feature in a work such as a computer program, web page, video
game, movie, book, or crossword is known as a virtual Easter egg.
C: The anomalous condition where a process attempts to store data beyond the boundaries of a fixed-length
buffer is known as buffer overflow.
D: In computing, a condition where a program (either an application or part of the operating system) stops
performing its expected function and also stops responding to other parts of the system is known as a crash.

https://en.wikipedia.org/wiki/Exploit_%28computer_security%29
https://www.quora.com/topic/Easter-Eggs-media
https://en.wikipedia.org/wiki/Buffer_overflow
http://www.article-buzz.com/Article/Avoiding-Data-Loss—A-Guide-To-The-Best-Online-Data-StorageWebsites/328757#.Vjc757crKHu