CSS Quiz 4 Answers
Q1. If we talk about control hijacking, which of the following is true?
In Buffer overflow attacks, stack-based attacks are more common than heap-based attack.
Integer overflow attacks is not a type of control hijacking.
Format string vulnerabilities are used to prevent control hijacking.
All of the above
Reason: An integer overflow occurs when you attempt to store inside an integer variable a value that is larger than the maximum value the variable can hold.
Programmer for Noobs
Programmer for Noobs
Q2. If we mark the stack and heap segment as non-executable,
No code will execute.
return-oriented programming will also not be able to exploit it.
we can prevent overflow code execution.
All of the above.
Reason: If we mark the stack and heap segment as non-executable, we can prevent overflow code execution. because Overflow code execution can be prevented by marking the stack and heap segments as non-executable .
Programmer for Noobs
Programmer for Noobs Q3. If we talk about Return Oriented Programming, which of the following statement is true ?
It is a computer security exploit technique that allows an attacker to execute code in the presence of security defences such as DEP and code signing
These types of attacks arise when an adversary manipulates the call stack by taking advantage of a bug in the program, often a buffer overflow.
Return-oriented programming is an advanced version of a stack smashing attack.
All of the above
Reason: If we talk about Return Oriented Programming the right answer is All of the above because this statement is true .
Programmer for Noobs
Q4. An hardware device's interrupt request invokes ____ , which handles this interrupt.
Instruction Set Randomization
Information Storage and Retrieval
Interrupt Service Routine
Intermediate Session Routing
Reason: An ISR (also called an interrupt handler) is a software process invoked by an interrupt request from a hardware device. It handles the request and sends it to the CPU, interrupting the active process. When the ISR is complete, the process is resumed .
Programmer for Noobs
Programmer for Noobs Q5. Which of the following is a method of randomization?
ASLR
Sys-call randomization
Memory randomization
All of the above.
Reason: ASLR , Sys-call randomization , Memory randomization is a method of randomization and ISR is not a randomization .
Programmer for Noobs
Please subscribe to our channel
0 Comments