Computer System Security 4th Week Solution 2020 || css quiz 4 week solution

 

Computer System Security 4th Week Solution 2020. 





Q:1. If we talk about control hijacking, which of the following is true ? 

 (a).In Buffer overflow attacks, stack based attacks are more common than heap based attack.
 (b).Integer overflow attacks is not a type of control hijacking.
 (c).Format string vulnerabilities are used to prevent control hijacking.
 (d).All of the above

Answer :- (b) .Integer overflow attacks is not a type of control hijacking.

Reason :-  .Integer overflow attacks is not a type of control hijacking. so  it right answer of control hijacking . 

Q:2. If we mark the stack and heap segement as non executable,

 (a).No code will execute.
 (b).return-oriented programming will also not be able to exploit it.
 (c).we can prevent overflow code execution.
 (d).All of the above.

Answer :- (c).we can prevent overflow code execution.

Reason :-If we mark the stack and heap segement as non executable, we can prevent overflow code execution. because Overflow code execution can be prevented by marking the stack and heap segments as non-executable .

Q:3. If we talk about Return Oriented Programming, which of the following statement is true ?

 (a).It is a computer security exploit technique that allows an attacker to execute code in the presence of security defences such as DEP and code signing
 (b).These types of attacks arise when an adversary manipulates the call stack by taking advantage of a bug in the program, often a buffer overflow.
 (c).Return-oriented programming is an advanced version of a stack smashing attack.
 (d).All of the above

Answer :- (d).All of the above

Reason :-If we talk about Return Oriented Programming the right answer is All of the above because this statement is true .




Q:4. An hardware device's interrupt request invokes ____ , which handles this interrupt.


 (a).Instruction Set Randomization
 (b).Information Storage and Retrieval
 (c).Interrupt Service Routine
 (d).Intermediate Session Routing

Answer :- (c).Interrupt Service Routine

Reason :- An ISR (also called an interrupt handler) is a software process invoked by an interrupt request from a hardware device. It handles the request and sends it to the CPU, interrupting the active process. When the ISR is complete, the process is resumed .

Q:5. Which of the following is a method of randomization?

(a).ASLR
(b).Sys-call randomization
(c).Memory randomization
(d).All of the above.

Answer :- (d).All of the above.

Reason :- ASLR , Sys-call randomization , Memory randomization   is a method of randomization and ISR is not a randomization .

Post a Comment

14 Comments

  1. Bro python ki bhi update kr do

    ReplyDelete
    Replies
    1. karta hu bhai jal di please instagram par question mujhe bhej do
      jald hi post kar duga

      Delete
  2. Python quiz 4 week answer with explanation please bhai hurry up

    ReplyDelete
  3. question 1 answer is A)
    Stack-based buffer overflows are more common, and leverage stack memory that only exists during the execution time of a function.
    Heap-based attacks are harder to carry out and involve flooding the memory space allocated for a program beyond memory used for
    current runtime operations.

    ReplyDelete
  4. Check out my. Blog website
    Https://braiengineer.blogspot.com/

    ReplyDelete