Header Ads Widget

Responsive Advertisement

Computer System Security Special Quiz Solution [Cyber Security course on Prutor.ai]

Here you will get all the assignment and quiz solutions of Computer System Security Course by prutor.ai under the category Cyber Security. Prutor is an online smart tutoring platform which provides various MOOC courses for student and organised by by IIT Kharagpur. At the end of each course student gets a certificate for sucessfull  completion of each course but throughout the course students have to pass all the weekly assignments and quizes.

 

Q:1. What does CVE stand for?

1. Computer Vulnerability and Exploits

2. Common Vulnerabilities and Exposures

3. Computer Vulnerabilities and Exposures

4. Common Vulnerability and Exploits

Answer:- 2. Common Vulnerabilities and Exposures


Q:2. Which of the following it was incorrect for Target company attack?

1. It is an example of server-side attack

2. More than 140 million credit card information was stolen in the attack

3. The attack happened in 2011

4. None of the above


Answer:- 3. The attack happened in 2011


Q:3. A format string is a ____ string that contains ___ and ____ parameters.

1. Format, text, ASCII

2. Text, ASCII, format

3. ASCII, text, format

4. None of the above

Answer:-3. ASCII, text, format


Q:4. In ASLR, an attacker cannot jump directly to execute function.

1. True

2. False

Answer:-1. True


Q:5. Which of the following is incorrect with respect to FreeBSD jail?

1. It can only bind to sockets with specified IP address and authorized ports

2. It can communicate with processes inside and outside of jail

3. Root is limited (example: cannot load kernel modules)

4. None of the above

Answer:-3. Root is limited (example: cannot load kernel modules)


Q:6. Which of the following is not an attack tool

1. Password cracker

2. Network sniffer

3. Autorooter

4. Rootkit Revealer

Answer:-2. Network sniffer


Q:7. Which of the following information is contained in the access tokens?

1. The security identifier (SID) for the user’s account

2. A list of the privileges held by either the user or the user’s groups

3. The SID for the primary group

4. All of the above

Answer:-4. All of the above


Q:8. Cookies were originally designed for

1. Client-side programming

2. Server-side programming

3. Both Client-side programming and Server-side programming

4. None of the mentioned

Answer:-2. Server-side programming



Q:9. What of the following is a website vulnerability?

1. SQL Injection

2. CSRF

3. Cross Side Scripting

4. All of the above

Answer:-4. All of the above


Q:10. Some of cryptography protocols are :-

1. SSL

2. SET

3. IPSec

4. All of the above

Answer:-4. All of the above


Computer System Security Special Quiz Solution is given below. the solution of Computer System Security special Week Solution and all the answers are correct.

Post a Comment

0 Comments