AKTU -4 Computer System Security 4 Quiz answer
AKTU Computer System Security 4 Quiz answer
Question:1- If we talk about control hijacking, which of the following is true ?
- In Buffer overflow attacks, stack based attacks are more common than heap based attack.
- Integer overflow attacks is not a type of control hijacking.
- Format string vulnerabilities are used to prevent control hijacking.
- All of the above
Question:2- If we mark the stack and heap segement as non executable,
- No code will execute.
- return-oriented programming will also not be able to exploit it.
- we can prevent overflow code execution.
- All of the above.
Question:3- If we talk about Return Oriented Programming, which of the following statement is true ?
- It is a computer security exploit technique that allows an attacker to execute code in the presence of security defences such as DEP and code signing
- These types of attacks arise when an adversary manipulates the call stack by taking advantage of a bug in the program, often a buffer overflow.
- Return-oriented programming is an advanced version of a stack smashing attack.
- All of the above
Question:4- An hardware device's interrupt request invokes ____ , which handles this interrupt.
- Instruction Set Randomization
- Information Storage and Retrieval
- Interrupt Service Routine
- Intermediate Session Routing
Question:5- Which of the following is a method of randomization ?
- ASLR
- Sys-call randomization
- Memory randomization
- All of the above.

Comments
Post a Comment