CSS Quiz 5 AKTU - Scifi Curoisity
  • CSS Quiz 5 AKTU





     Q1) Chroot jail is used to _______ process and its children by ________ to the supplied directory name.

    • isolate, changing the root directory
    • ->  change, the name
    • execute, renaming it
    • All of the above

    Reason : chroot jail is a way to isolate a process and its children from the rest of the system. It should only be used for processes that don't run as root, as root users can break out of the jail very easily




    Q2) Taliking about FreeBSD jail, which of the following is true ?

    • It can only bind to sockets with specified IP address and authorized ports
    • ->  It can communicate with processes inside and outside of jail
    • Root is limited (example: cannot load kernel modules)
    • None of the above

    Reason : The jail mechanism is an implementation of FreeBSD's OS-level virtualisation that allows system administrators to partition a FreeBSD-derived computer system into several independent mini-systems called jails, all sharing the same kernel, with very little overhead.




    Q3) Which of the following is incorrect for System call interposition ?

    • It tracks all the system service requests of processes.
    • Each system request can be modified or denied.
    • ->  It is impossible to implement tools to trace, monitor, or virtualize processes.
    • None of the above.

    Reason: Abstract: System call interposition is a powerful method for regulating and monitoring program behavior. A system call correlating method is proposed to identify the coherent system calls belonging to the same process from the system call sequence. 




    Q4) Which of the following is a computer security utility which limits an application's access to the system by enforcing access policies for system calls ?

    • -> systrace
    • NetBSD
    • ptrace
    • None of the above

    Reason: Systrace is a computer security utility which limits an application's access to the system by enforcing access policies for system calls. This can mitigate the effects of buffer overflows and other security vulnerabilities.





    Q5) Which of the following uses a call back mechanism in the kernel module to redirect system calls ?

    • systrace
    • -> ptrace
    • ostia
    • NetBSD

    Reason: ptrace is a system call found in Unix and several Unix-like operating systems. By using ptrace (the name is an abbreviation of "process trace") one process can control another, enabling the controller to inspect and manipulate the internal state of its target.

  • You might also like

    No comments :

    Post a Comment

Featured

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3....

Tags

Recommended Posts

randomposts

Trending This Week

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3. Upper case and lower-case letters, numbers and non letter characters 4. -> Upper case and lower-case letters, numbers and symbols Reason: The key aspects of a strong password are length (the longer the better); a mix of letters (upper and lower case), numbers, and symbols, no ties to your personal information, and no dictionary words Q:2.  The cookies we use, are sent with ______, which in general, _____ the performance. 1. only when requested,improves 2. -> every request, degrades 3. extra information, is useless for 4. None of the mentioned Reason : typically cookies are used for a variety of purposes: ... Cookies impact performance because every time you make a request to a ... an HTML file, a CSS file, an image) the browser will send the cookie in the request to the server. ... request becomes a little bigger and thus perfo...

CSS Quiz 2 aktu

Q1) The storm botnet was mainly used for _______ ? Phishing ->D-Dos Attack Hacking None of the above Reason :  The storm botnet was mainly used for Spamming. Q2) Which statement is incorrect for silent banker ? It is a trojan horse It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker ->Both A and B None of the above Reason  The statement is incorrect for silent banker is Option ( c ) Both A and B. Q3) Which of the following is true for Stuxnet? It is a virus It is A botnet ->It is a computer worm A ransomware Reason :   Stuxnet is a malicious computer worm first uncovered in 2010. Q4) Which of the following is incorrect for the attack on Target Corporation? It is an example of server-side attack More than 140 million credit card information was stolen in the attack ->The attack happened in 2011 None of the above Reason:  The  attack  happened in 2011' is an  incorrect  ...

Featured