CSS QUIZ - 4 (Solution with the answer)


CSS QUIZ - 4
 

Answers require a reason. We may evaluate only those answers that have a proper reason

Q:1. If we talk about control hijacking, which of the following is true ?

1. In Buffer overflow attacks, stack based attacks are more common than heap based attack.

2. Integer overflow attacks is not a type of control hijacking.

3. Format string vulnerabilities are used to prevent control hijacking.

4. All of the above

Ans1(a)Buffer overflow attacks are known to be the Most common type of attacks that allow attackers to hijack a remote system by sending a specially crafted packet to a vulnerable network application running on it

Q:2. If we mark the stack and heap segement as non executable,

1. No code will execute.

2. return-oriented programming will also not be able to exploit it.

3. we can prevent overflow code execution.

4. All of the above.

Ans2(c)- Prevent attack code execution by Marking stack and heap non-executable.

Limitations:-

- SOME apps need executable heap (e.g. JITS). - Does not defend against Return Oriented Programming' exploits.


Q:3. If we talk about Return Oriented Programming, which of the following statement is true ?

1. It is a computer security exploit technique that allows an attacker to execute code in the presence of security defences such as DEP and code signing

2. These types of attacks arise when an adversary manipulates the call stack by taking advantage of a bug in the program, often a buffer overflow.

3. Return-oriented programming is an advanced version of a stack smashing attack.

4. All of the above

Ans3(d)Return-oriented programming is a computer security exploit technique that allows an attacker to execute code in the presence of security defenses such as executable space protection and code signing.

Q:4. An hardware device's interrupt request invokes __ , which handles this interrupt.

1. Instruction Set Randomization

2. Information Storage and Retrieval

3. Interrupt Service Routine

4. Intermediate Session Routing

Ans4(c)Stands for "Interrupt Service Routine. An ISR (also called an interrupt handler) is a software process invoked by an interrupt request from a hardware device. It handles the request and sends it to the CPU, interrupting the active process. When the ISR is Complete, the process is resumed.


Q:5. Which of the following is a method of randomization?

1. ASLR

2. Sys-call randomization

3. Memory randomization

4. All of the above.

Ans5(d)- ASLR, Sys-call randomization, Memory randomization, these are the methods of randomization except ISR.

Hope you guys have liked this and hey stay connected in this blog for more Information, See you soon.

Till then Jai Hind and Vande Mataram ðŸ˜‡.

Comments

  1. It was so helpful, thankyou so much sir :)

    ReplyDelete

Post a Comment

Popular Posts