Computer System Security 5th Week Solution 2020.
Important Notes:-
Hello Dosto Please Subscribe Our Youtube channel Because Copyright Problem In this post ( python / css / Al / nptel ) So please i humble Request Subscribe Our channel or social Networks ( than we are all are connect To each and every person ) These are Our youtube channel My Youtube Channel .. only 321 subscribe in my youtube channel .( channel ko subscribe kar lo kyuki kabhi bhi website band ho sakti hai sar post 2019 se ho rhe hai or answer sare senior ke dwara batye hue hai ) . youtube channel ko jaldi se share karo tak jada subscribe ho jaye to copyright ka koi problem na ho .. thanks
Answers require a reason. We may evaluate only those answers that have a proper reason
Q:1. Chroot jail is used to _______ process and its children by ________ to the supplied directory name.
(a).isolate, changing the root directory
(b).change, the name
(c).execute, renaming it
(d).All of the above
Answer:- (b).change, the name
Reason :- A chroot on Unix operating systems is an operation that changes the apparent root directory for the current running process and its children. The programs that run in this modified environment cannot access the files outside the designated directory tree. This essentially limits their access to a directory tree and thus they get the name “chroot jail”.
Q:2. Taliking about FreeBSD jail, which of the following is true ?
(a).It can only bind to sockets with specified IP address and authorized ports
(b).It can communicate with processes inside and outside of jail
(c).Root is limited (example: cannot load kernel modules)
(d).None of the above
Answer :-(b).It can communicate with processes inside and outside of jail
Reason :- The jail mechanism is an implementation of FreeBSD's OS-level virtualisation that allows system administrators to partition a FreeBSD-derived computer system into several independent mini-systems called jails, all sharing the same kernel, with very little overhead.
Q:3. Which of the following is incorrect for System call interposition?
(a).It tracks all the system service requests of processes.
(b).Each system request can be modified or denied.
(c).It is impossible to implement tools to trace, monitor, or virtualize processes.
(d).None of the above.
Answer:-(c).It is impossible to implement tools to trace, monitor, or virtualize processes.
Reason:- Abstract: System call interposition is a powerful method for regulating and monitoring program behavior. ... A system call correlating method is proposed to identify the coherent system calls belonging to the same process from the system call sequence.
Q:4. Which of the following is a computer security utility which limits an application's access to the system by enforcing access policies for system calls?
(a).systrace
(b).NetBSD
(c).ptrace
(d).None of the above
Answer:- (a).systrace
Reason:- Systrace is a computer security utility which limits an application's access to the system by enforcing access policies for system calls. This can mitigate the effects of buffer overflows and other security vulnerabilities.
Q:5. Which of the following uses a call back mechanism in the kernel module to redirect system calls?
(a).systrace
(b).ptrace
(c).ostia
(d).NetBSD
Answer :- (b).ptrace
Reason:- ptrace is a system call found in Unix and several Unix-like operating systems. By using ptrace (the name is an abbreviation of "process trace") one process can control another, enabling the controller to inspect and manipulate the internal state of its target.
17 Comments
Bhai python ki bhi upload kar do
ReplyDeleteok bro 10 am se phele ho jayega
DeleteBhai python Ka upload kar do please
Deletebhai 5 ka ans galat hai , ostia hoga
ReplyDeleteYes.
DeleteOstia uses a callback mechanism in the kernel module to redirect system calls. (Ostia evolved from an earlier delegating system we built that relied on
shared library replacement to redirect system calls. Ostia’s handler must be installed into the program’s address space before the program gets control.
https://benpfaff.org/papers/ostia.pdf
ReplyDeletectrl f karke find karlo question ka part
Css 6th weak solution plz provide
ReplyDeleteI stakeout the subject’s house for six hours with no activity, I made a call to his residence, I received his answering machine and there were no vehicles parked in the driveway or nearby.
ReplyDeletelook here
Excellent article. Very interesting to read. I really love to read such a nice article. Thanks! keep rocking. security system company
ReplyDelete7th & 8th quiz ke answers jaldi dalo yaar kya kar rage ho
ReplyDeleteuplode phele se hai bas public karna hai
DeleteWow, What a Excellent post. I really found this to much informatics. It is what i was searching for.I would like to suggest you that please keep sharing such type of info.Thanks security company singapore
ReplyDeletePretty good post. I just stumbled upon your blog and wanted to say that I have really enjoyed reading your blog posts. Any way I'll be subscribing to your feed and I hope you post again soon. Big thanks for the useful info. security firms singapore
ReplyDeleteThanks for taking the time to discuss this, I feel strongly that love and read more on this topic. If possible, such as gain knowledge, would you mind updating your blog with additional information? It is very useful for me. security guard services singapore
ReplyDeleteI’m going to read this. I’ll be sure to come back. thanks for sharing. and also This article gives the light in which we can observe the reality. this is very nice one and gives indepth information. thanks for this nice article... check more info about Security Company
ReplyDeleteYour blog has chock-a-block of useful information. I liked your blog's content as well as its look. In my opinion, this is a perfect blog in all aspects. best security company
ReplyDeleteI haven’t any word to appreciate this post.....Really i am impressed from this post....the person who create this post it was a great human..thanks for shared this with us. security company in cambodia
ReplyDelete