AKTU -4 Computer System Security 4 Quiz answer

 

AKTU Computer System Security  4 Quiz answer 






Question:1-  If we talk about control hijacking, which of the following is true ? 

  • In Buffer overflow attacks, stack based attacks are more common than heap based attack.
  • Integer overflow attacks is not a type of control hijacking.
  • Format string vulnerabilities are used to prevent control hijacking.
  • All of the above

Question:2-  If we mark the stack and heap segement as non executable,

  • No code will execute.
  • return-oriented programming will also not be able to exploit it.
  • we can prevent overflow code execution.
  • All of the above.
  • Question:3- If we talk about Return Oriented Programming, which of the following statement is true ?

    • It is a computer security exploit technique that allows an attacker to execute code in the presence of security defences such as DEP and code signing
    • These types of attacks arise when an adversary manipulates the call stack by taking advantage of a bug in the program, often a buffer overflow.
    • Return-oriented programming is an advanced version of a stack smashing attack.
    • All of the above
    • Question:4- An hardware device's interrupt request invokes ____ , which handles this interrupt.

      • Instruction Set Randomization
      • Information Storage and Retrieval
      • Interrupt Service Routine
      • Intermediate Session Routing

Question:5- Which of the following is a method of randomization ?

  • ASLR
  • Sys-call randomization
  • Memory randomization
  • All of the above.



Comments

Popular posts from this blog

AKTU : 9 Computer System Security Quiz answer

AKTU : 8 Computer System Security Quiz answer

T20 squad team