Computer System Security 4th Week Solution 2020.
Q:1. If we talk about control hijacking, which of the following is true ?
(a).In Buffer overflow attacks, stack based attacks are more common than heap based attack.
(b).Integer overflow attacks is not a type of control hijacking.
(c).Format string vulnerabilities are used to prevent control hijacking.
(d).All of the above
Answer :- (b) .Integer overflow attacks is not a type of control hijacking.
Reason :- .Integer overflow attacks is not a type of control hijacking. so it right answer of control hijacking .
Q:2. If we mark the stack and heap segement as non executable,
(a).No code will execute.
(b).return-oriented programming will also not be able to exploit it.
(c).we can prevent overflow code execution.
(d).All of the above.
Answer :- (c).we can prevent overflow code execution.
Reason :-If we mark the stack and heap segement as non executable, we can prevent overflow code execution. because Overflow code execution can be prevented by marking the stack and heap segments as non-executable .
Q:3. If we talk about Return Oriented Programming, which of the following statement is true ?
(a).It is a computer security exploit technique that allows an attacker to execute code in the presence of security defences such as DEP and code signing
(b).These types of attacks arise when an adversary manipulates the call stack by taking advantage of a bug in the program, often a buffer overflow.
(c).Return-oriented programming is an advanced version of a stack smashing attack.
(d).All of the above
Answer :- (d).All of the above
Reason :-If we talk about Return Oriented Programming the right answer is All of the above because this statement is true .
Q:4. An hardware device's interrupt request invokes ____ , which handles this interrupt.
(a).Instruction Set Randomization
(b).Information Storage and Retrieval
(c).Interrupt Service Routine
(d).Intermediate Session Routing
Answer :- (c).Interrupt Service Routine
Reason :- An ISR (also called an interrupt handler) is a software process invoked by an interrupt request from a hardware device. It handles the request and sends it to the CPU, interrupting the active process. When the ISR is complete, the process is resumed .
Q:5. Which of the following is a method of randomization?
(a).ASLR
(b).Sys-call randomization
(c).Memory randomization
(d).All of the above.
Answer :- (d).All of the above.
Reason :- ASLR , Sys-call randomization , Memory randomization is a method of randomization and ISR is not a randomization .
14 Comments
Bro python ki bhi update kr do
ReplyDeletekarta hu bhai jal di please instagram par question mujhe bhej do
Deletejald hi post kar duga
Bhai instagram id ??
ReplyDeletehttps://www.instagram.com/amitrajkashyup/
Deleteamitrajkashyup
DeletePython quiz 4 week answer with explanation please bhai hurry up
ReplyDeleteok bro
DeleteQue 1 ka ans edit kr digiye
ReplyDeleteok kar diya
Deletequestion 1 answer is A)
ReplyDeleteStack-based buffer overflows are more common, and leverage stack memory that only exists during the execution time of a function.
Heap-based attacks are harder to carry out and involve flooding the memory space allocated for a program beyond memory used for
current runtime operations.
thanks
Deletetankyou
DeleteCheck out my. Blog website
ReplyDeleteHttps://braiengineer.blogspot.com/
Quiz 7 ke answer bhejo
ReplyDelete