Question 1 [CLO-11. [Total =10 noints] 1. In the box put T if True or F if false (A-E) [5 points ] A. In a successful buffer overflow code injection attack, the malicious code is i. onto the stack. B. Stack Guard is a kernel patch. C. Heartbleed bug was found in a Secure Shell (SSH) server. D. GET request is sent from Server to Client. E. Integer overflow can be exploited to cause Heap overflow. Multiple choices - Choose the best answer (1-5): [5 points] 1. A What attack is done by the following statements? inta=5;printf("$88",a,a), a. Integer overflow b. Format string c. Read overflow (d) No attack is done c. Heap overflow Let unsigned short int be a data type that has range [8,+7] and unsigned short int. The value of V is 6 . Which of the following: a. V+1=8x b. V+4=1 V+V=4 None of the above is true ch of the followings is not possible with format strin iew the stack content rite at the code segment d data from heap h the program of the above A. In a successful buffer overflow code injection attack, the malicious code i onto the stack. [] B. Stack Guard is a kernel patch. [] C. Heartbleed bug was found in a Secure Shell (SSH) server. [F] D. GET request is sent from Server to Client. E. Integer overflow can be exploited to cause Heap overflow. Multiple choices - Choose the best answer (1-5): [5 points] 1. A What attack is done by the following statements? a. Integer overflow b. Format string c. Read overflow (d.) No attack is done e. Heap overflow Let unsigned short int be a data type that has range [8,(+7) an unsigned short int. The value of V is 6 . Which of the followin a. V+1=8 b. V+4=1 V+V=4x V+6=1x None of the above is true ch of the followings is not possible with format stri iew the stack content rite at the code segment d data froma heap he the programa afthe alove