Q1 . If we talk about control hijacking, which of the following is true ? 1.In Buffer overflow attacks, stack based attacks are more common than heap based attack.2.Integer overflow attacks is not a type of control hijacking.3.Format string vulnerabilities are used to prevent control hijacking.4.All of the above
Q2 . If we mark the stack and heap segement as non executable, 1.No code will execute.2.return-oriented programming will also not be able to exploit it.3.we can prevent overflow code execution.4.All of the above.
Q3 . If we talk about Return Oriented Programming, which of the following statement is true ? 1.It is a computer security exploit technique that allows an attacker to execute code in the presence of security defences such as DEP and code signing2.These types of attacks arise when an adversary manipulates the call stack by taking advantage of a bug in the program, often a buffer overflow.3.Return-oriented programming is an advanced version of a stack smashing attack.4.All of the above Q4 . An hardware device's interrupt request invokes ____ , which handles this interrupt 1. Instruction Set Randomisation2. Information Storage and Retrieval3. Interrupt Service Routine4. Intermediate Session Routing Q5 . Which of the following is a method of randomisation
1. ASLR2. Sys-call Randomization3. Memory Randomization4. All of the above
0 Comments