nerdexam
EC-CouncilEC-Council

312-49 · Question #587

312-49 Question #587: Real Exam Question with Answer & Explanation

The correct answer is A: Adjacent memory locations. A buffer overflow occurs when data written to a buffer exceeds its allocated size, causing it to spill into adjacent memory locations. This can overwrite return addresses, function pointers, or other critical data in memory, allowing an attacker to hijack program execution. 'Adja

Submitted by noor.lb· Apr 18, 2026Malware Forensics

Question

Buffer overflow vulnerability of a web application occurs when it fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the_________. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.

Options

  • AAdjacent memory locations
  • BAdjacent bit blocks
  • CAdjacent buffer locations
  • DAdjacent string locations

Explanation

A buffer overflow occurs when data written to a buffer exceeds its allocated size, causing it to spill into adjacent memory locations. This can overwrite return addresses, function pointers, or other critical data in memory, allowing an attacker to hijack program execution. 'Adjacent bit blocks,' 'adjacent buffer locations,' and 'adjacent string locations' are not standard memory architecture terms. The correct term is adjacent memory locations, which accurately describes contiguous regions in a process's address space.

Topics

#Buffer Overflow#Memory Corruption#Vulnerability#Web Application Security

Community Discussion

No community discussion yet for this question.

Full 312-49 PracticeBrowse All 312-49 Questions