Looking For Anything Specific?

ads header

Computer System Security Quiz 4 Answers

 


Programmer for Noobs

CSS Quiz 4 Answers

Q1.  If we talk about control hijacking, which of the following is true? 

  • In Buffer overflow attacks, stack-based attacks are more common than heap-based attack.

  • Integer overflow attacks is not a type of control hijacking.

  • Format string vulnerabilities are used to prevent control hijacking.

  • All of the above

Reason: An integer overflow occurs when you attempt to store inside an integer variable a value that is larger than the maximum value the variable can hold. 

Programmer for Noobs




Programmer for Noobs

Q2. If we mark the stack and heap segment as non-executable,

  • No code will execute.

  • return-oriented programming will also not be able to exploit it.

  • we can prevent overflow code execution.

  • All of the above.

Reason: If we mark the stack and heap segment as non-executable, we can prevent overflow code execution. because Overflow code execution can be prevented by marking the stack and heap segments as non-executable .

Programmer for Noobs





Programmer for Noobs Q3. If we talk about Return Oriented Programming, which of the following statement is true ?

  • It is a computer security exploit technique that allows an attacker to execute code in the presence of security defences such as DEP and code signing

  • These types of attacks arise when an adversary manipulates the call stack by taking advantage of a bug in the program, often a buffer overflow.

  • Return-oriented programming is an advanced version of a stack smashing attack.

  • All of the above

Reason:  If we talk about Return Oriented Programming the right answer is All of the above because this statement is true .

Programmer for Noobs






Q4.  An hardware device's interrupt request invokes ____ , which handles this interrupt.

  • Instruction Set Randomization

  • Information Storage and Retrieval

  • Interrupt Service Routine

  • Intermediate Session Routing

Reason:  An ISR (also called an interrupt handler) is a software process invoked by an interrupt request from a hardware device. It handles the request and sends it to the CPU, interrupting the active process. When the ISR is complete, the process is resumed .

Programmer for Noobs




Programmer for Noobs Q5. Which of the following is a method of randomization?

  • ASLR

  • Sys-call randomization

  • Memory randomization

  • All of the above.

Reason:  ASLR , Sys-call randomization , Memory randomization   is a method of randomization and ISR is not a randomization .

Programmer for Noobs 

Please subscribe to our channel 





Post a Comment

0 Comments