Program Insecurity
- 
    
What is the difference between a vulnerability and an exploit?
 - 
    
What is a CVE alert (Common Vulnerability and Exposure) and when is it emitted?
 - 
    
What is a zero-day attack and when does it occurs?
 - 
    
In a “stack smashing attack”,
- what kind of programming error does the attacker want to exploit?
 - what does the attacker aim to overwrite?
 - What does the attacker aim to inject?
 - when the attack succeeds, what privileges does the attacker get?
 
 
Operating System Insecurity
- 
    
Assuming that the attacker does not have an user account on a machine (nor a physical access to the machine), how can he/she attack it? When the attack succeeds what privileges does the attacker get?
 - 
    
Assuming that the attacker does have an account on the machine (but not a physical access), how can he/she attack it? When the attack succeeds what privileges does the attacker get?
 - 
    
Assuming that the attacker does have a physical access to the machine, how can he/she attack it? When the attack succeeds what privileges does the attacker get?
 
