CSS quiz 4 aktu - Scifi Curoisity
  • CSS quiz 4 aktu


     


    Q:1. If we talk about control hijacking, which of the following is true ?

    1.
    2.->
    3.
    4.
    Reason :   Integer overflow occurs when you attempt to store inside an integer variable a value that is larger than the maximum value the variable can hold. 
    Q:2. If we mark the stack and heap segement as non executable,
    1.
    2.
    3.->
    4.
    Reason: If we mark the stack and heap segement as non executable, we can prevent overflow code execution. because Overflow code execution can be prevented by marking the stack and heap segments as non-executable .

    Q:3.
     If we talk about Return Oriented Programming, which of the following statement is true ?
    1.
    2.
    3.->
    4.
    Reason :  If we talk about Return Oriented Programming the right answer is All of the above because this statement is true .


    Q:4.
     An hardware device's interrupt request invokes ____ , which handles this interrupt.
    1.
    2.
    3.->
    4.
    Q:5. Which of the following is a method of randomization?
    1.
    2.
    3.
    4.->
    Reason : ASLR , Sys-call randomization , Memory randomization   is a method of randomization and ISR is not a randomization .
  • You might also like

    1 comment :

    1. Css Quiz 4 Aktu
      -
      Scifi Curoisity >>>>> Download Now

      >>>>> Download Full

      Css Quiz 4 Aktu
      -
      Scifi Curoisity >>>>> Download LINK

      >>>>> Download Now

      Css Quiz 4 Aktu
      -
      Scifi Curoisity >>>>> Download Full

      >>>>> Download LINK

      ReplyDelete

Featured

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3....

Tags

Recommended Posts

randomposts

Trending This Week

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3. Upper case and lower-case letters, numbers and non letter characters 4. -> Upper case and lower-case letters, numbers and symbols Reason: The key aspects of a strong password are length (the longer the better); a mix of letters (upper and lower case), numbers, and symbols, no ties to your personal information, and no dictionary words Q:2.  The cookies we use, are sent with ______, which in general, _____ the performance. 1. only when requested,improves 2. -> every request, degrades 3. extra information, is useless for 4. None of the mentioned Reason : typically cookies are used for a variety of purposes: ... Cookies impact performance because every time you make a request to a ... an HTML file, a CSS file, an image) the browser will send the cookie in the request to the server. ... request becomes a little bigger and thus perfo...

CSS Quiz 2 aktu

Q1) The storm botnet was mainly used for _______ ? Phishing ->D-Dos Attack Hacking None of the above Reason :  The storm botnet was mainly used for Spamming. Q2) Which statement is incorrect for silent banker ? It is a trojan horse It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker ->Both A and B None of the above Reason  The statement is incorrect for silent banker is Option ( c ) Both A and B. Q3) Which of the following is true for Stuxnet? It is a virus It is A botnet ->It is a computer worm A ransomware Reason :   Stuxnet is a malicious computer worm first uncovered in 2010. Q4) Which of the following is incorrect for the attack on Target Corporation? It is an example of server-side attack More than 140 million credit card information was stolen in the attack ->The attack happened in 2011 None of the above Reason:  The  attack  happened in 2011' is an  incorrect  ...

CSS Quiz 1 aktu

     Question 1)  What was the percentage increase in Zero Day Vulnerabilities in the year 2015 ?     4%     50%     100% ->    125% Question 2)  Identify the software whose vulnerability is exploited the most ?     Android     -> Browser      Adobe Flash Player     Microsoft Office Question 3) The computer vulnerabilities and exploits databases are maintained by _________.    Kaspersky Lab    Symantec Corporation   ->  MITRE Corporation      None of the above Question 4) Which of the following is/are correct with respect to Ransomware ?     It is a form of Malware     It encrypts the whole hard drive of the computer, essentially locking the user out of the entire system.     It locks the system's screen or locks the users' files unless a ransom is paid. ->All of the above.   Questi...

Featured