CSS Quiz 3 AKtu - Scifi Curoisity
  • CSS Quiz 3 AKtu





    Q1) Which of the following programming languages have common buffer overflow problem in the development of applications ?

    • C, Ruby
    • C, C++
    • Python, Ruby
    • C, Python
    • Note:- C and C++ languages because they expose low level representational details of buffers as containers for data types..

    • Q2) Which type of buffer overflows are common among attackers ?

    • Memory-based
    • Queue-based
    • Stack-based
    • Heap-based
    • Note:-  Stack-based buffer overflows, which are more common among attackers, exploit applications and programs by using what is known as a stack, the memory space used to store user input.

    Q:3. In _________ attack, malicious code is pushed into ______.

    • buffer-overflow, stack
    • buffer-overflow, queue
    • buffer-overflow,memory-card
    • buffer-overflow,external drive

    Note:Malicious code can be pushed into the stack during the buffer-overflow attack. The overflow can be used to overwrite the return pointer so that the control-flow switches to the malicious code. 


    Q4) In case of integer overflow, Which of the following option/s is/are true ?

    • It is a result of an attempt to store a value greater than the maximum value an integer can store
    • Integer overflow can compromise a program's reliability and security
    • Both A and B
    • None of the above

    Note:- In case of integer overflow, so It is a result of an attempt to store a value greater than the maximum value an integer can store and Integer overflow can compromise a program's reliability and security is are true .


    Q5) A string which contains ___________ parameter/s, is called ______ string.

    • Format, text
    • Text, format
    • text and format, format
    • None of the above

    Note:- A string Which contains Text parameter/s is called Format string.

  • You might also like

    No comments :

    Post a Comment

Featured

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3....

Tags

Recommended Posts

randomposts

Trending This Week

CSS Quiz 2 aktu

Q1) The storm botnet was mainly used for _______ ? Phishing ->D-Dos Attack Hacking None of the above Reason :  The storm botnet was mainly used for Spamming. Q2) Which statement is incorrect for silent banker ? It is a trojan horse It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker ->Both A and B None of the above Reason  The statement is incorrect for silent banker is Option ( c ) Both A and B. Q3) Which of the following is true for Stuxnet? It is a virus It is A botnet ->It is a computer worm A ransomware Reason :   Stuxnet is a malicious computer worm first uncovered in 2010. Q4) Which of the following is incorrect for the attack on Target Corporation? It is an example of server-side attack More than 140 million credit card information was stolen in the attack ->The attack happened in 2011 None of the above Reason:  The  attack  happened in 2011' is an  incorrect  ...

HOW TO ADD TAGS IN YouTube VIDEOS GET IN RECOMENDED YOUR VIDEO

                                                                      GET YOUR VIDEOS IN RECOMMENDED FOLLOWING STEPS TO UPLOAD YOUR VIDEO IN YOUTUBE OPEN CHROME (IN MOBILE USE DESKTOP MODE) GO TO YOUR CHANNELL.                                                        2.  GO TO YOUR VIDEOS THOSE UPLOADED.                             3. CLICK ON EDIT ICON WHICH VIDEO YOU WANT.                         4. YOU CAN EDIT HERE ALL WHICH CAN HELP YOUR VIDEOS EASLY TO ...

CSS quiz 4 aktu

  Q:1.  If we talk about control hijacking, which of the following is true ? 1. In Buffer overflow attacks, stack based attacks are more common than heap based attack. 2.-> Integer overflow attacks is not a type of control hijacking. 3. Format string vulnerabilities are used to prevent control hijacking. 4. All of the above Reason :      I nteger overflow  occurs when you attempt to store inside an  integer  variable a value that is larger than the maximum value the variable can hold.   Q:2.  If we mark the stack and heap segement as non executable, 1. No code will execute. 2. return-oriented programming will also not be able to exploit it. 3.-> we can prevent overflow code execution. 4. All of the above. Reason :   If we mark the stack and heap segement as non executable, we can prevent overflow code execution. because Overflow code execution can be prevented by marking the stack and heap segments as non-executable . Q:3. ...

Featured