Computer System Security Special Quiz Solution

0
3559
Computer System Security Special Quiz Solution
Computer System Security Special Quiz Solution

Disclaimer for ReGyan

If you require any more information or you have any problem regarding Copyright or have any questions about our site’s disclaimer, please feel free to contact us by email at hello@regyan.com.

Disclaimers for ReGyan

All the information on this website is published in good faith and for general information and educational purpose only. ReGyan does not make any warranties about the completeness, reliability, and accuracy of this information. Any action you take upon the information you find on this website (regyan.com), is strictly at your own risk. will not be liable for any losses and/or damages in connection with the use of our website.

Computer System Security Special Quiz Solution is given below:-




Q:1. What does CVE stand for?

1. Computer Vulnerability and Exploits

2. Common Vulnerabilities and Exposures

3. Computer Vulnerabilities and Exposures

4. Common Vulnerability and Exploits

Answer:- 2. Common Vulnerabilities and Exposures

Q:2. Which of the following it was incorrect for Target company attack?

1. It is an example of server-side attack

2. More than 140 million credit card information was stolen in the attack

Also See:- Reliance Jio Recruitment 2020 Apply Online

3. The attack happened in 2011

4. None of the above




Answer:- 3. The attack happened in 2011

Q:3. A format string is a ____ string that contains ___ and ____ parameters.

1. Format, text, ASCII

2. Text, ASCII, format

3. ASCII, text, format

4. None of the above

Answer:-3. ASCII, text, format

Q:4. In ASLR, an attacker cannot jump directly to execute function.

1. True

2. False




Answer:-1. True

Q:5. Which of the following is incorrect with respect to FreeBSD jail?

1. It can only bind to sockets with specified IP address and authorized ports

2. It can communicate with processes inside and outside of jail

3. Root is limited (example: cannot load kernel modules)

4. None of the above

Answer:-3. Root is limited (example: cannot load kernel modules)

Q:6. Which of the following is not an attack tool

1. Password cracker

2. Network sniffer

3. Autorooter

4. Rootkit Revealer




Answer:-2. Network sniffer

Q:7. Which of the following information is contained in the access tokens?

1. The security identifier (SID) for the user’s account

2. A list of the privileges held by either the user or the user’s groups

3. The SID for the primary group

4. All of the above

Answer:-4. All of the above

Q:8. Cookies were originally designed for

1. Client-side programming

2. Server-side programming

3. Both Client-side programming and Server-side programming

4. None of the mentioned

Answer:-2. Server-side programming




Also See:- Ericsson Recruitment 2020 Apply Online, Chennai & Bangalore Jobs

Q:9. What of the following is a website vulnerability?

1. SQL Injection

2. CSRF

3. Cross Side Scripting

4. All of the above

Answer:-4. All of the above

Q:10. Some of cryptography protocols are :-

1. SSL

2. SET

3. IPSec

4. All of the above




Answer:-4. All of the above

Computer System Security Special Quiz Solution is given below. the solution of Computer System Security special Week Solution and all the answers are correct.

LEAVE A REPLY

Please enter your comment!
Please enter your name here