CSS quiz 4 aktu - Scifi Curoisity
  • CSS quiz 4 aktu


     


    Q:1. If we talk about control hijacking, which of the following is true ?

    1.
    2.->
    3.
    4.
    Reason :   Integer overflow occurs when you attempt to store inside an integer variable a value that is larger than the maximum value the variable can hold. 
    Q:2. If we mark the stack and heap segement as non executable,
    1.
    2.
    3.->
    4.
    Reason: If we mark the stack and heap segement as non executable, we can prevent overflow code execution. because Overflow code execution can be prevented by marking the stack and heap segments as non-executable .

    Q:3.
     If we talk about Return Oriented Programming, which of the following statement is true ?
    1.
    2.
    3.->
    4.
    Reason :  If we talk about Return Oriented Programming the right answer is All of the above because this statement is true .


    Q:4.
     An hardware device's interrupt request invokes ____ , which handles this interrupt.
    1.
    2.
    3.->
    4.
    Q:5. Which of the following is a method of randomization?
    1.
    2.
    3.
    4.->
    Reason : ASLR , Sys-call randomization , Memory randomization   is a method of randomization and ISR is not a randomization .
  • You might also like

    1 comment :

    1. Css Quiz 4 Aktu
      -
      Scifi Curoisity >>>>> Download Now

      >>>>> Download Full

      Css Quiz 4 Aktu
      -
      Scifi Curoisity >>>>> Download LINK

      >>>>> Download Now

      Css Quiz 4 Aktu
      -
      Scifi Curoisity >>>>> Download Full

      >>>>> Download LINK

      ReplyDelete

Featured

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3....

Tags

Recommended Posts

randomposts

Trending This Week

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3. Upper case and lower-case letters, numbers and non letter characters 4. -> Upper case and lower-case letters, numbers and symbols Reason: The key aspects of a strong password are length (the longer the better); a mix of letters (upper and lower case), numbers, and symbols, no ties to your personal information, and no dictionary words Q:2.  The cookies we use, are sent with ______, which in general, _____ the performance. 1. only when requested,improves 2. -> every request, degrades 3. extra information, is useless for 4. None of the mentioned Reason : typically cookies are used for a variety of purposes: ... Cookies impact performance because every time you make a request to a ... an HTML file, a CSS file, an image) the browser will send the cookie in the request to the server. ... request becomes a little bigger and thus perfo...

How to integrate Git bash With Vs code

  # Integrated-VS-code-with-git-bash Let's See How to integrate git bash with vs code  > first you need to oopen setting > sarch setting.json  > then in last you have to paste like these  >      "terminal.integrated.shell.windows": "C:\\Program Files\\Git\\bin\\bash.exe"  Now you will able to use git bash terminal in vs code 

CSS Quiz 3 AKtu

Q1) Which of the following programming languages have common buffer overflow problem in the development of applications ? C, Ruby C, C++ Python, Ruby C, Python Note: -   C and C++  languages  because they expose low level representational details of  buffers  as containers for data types. . Q2) Which type of buffer overflows are common among attackers ? Memory-based Queue-based Stack-based Heap-based Note: -    Stack-based  buffer overflows , which are more  common among attackers , exploit applications and programs by using what is known as a stack, the memory space used to store user input . Q:3. In _________ attack, malicious code is pushed into ______. buffer-overflow, stack buffer-overflow, queue buffer-overflow,memory-card buffer-overflow,external drive Note: -  Malicious code  can be  pushed into  the stack during the buffer-overflow  attack . The overflow can be used  to  overwrite the return pointer...

Featured