Here you will get all the assignment and quiz solutions of Computer System Security Course by prutor.ai under the category Cyber Security. Prutor is an online smart tutoring platform which provides various MOOC courses for student and organised by by IIT Kharagpur. At the end of each course student gets a certificate for sucessfull completion of each course but throughout the course students have to pass all the weekly assignments and quizes.
Q:1. What does CVE stand for?
1. Computer Vulnerability and Exploits
2. Common Vulnerabilities and Exposures
3. Computer Vulnerabilities and Exposures
4. Common Vulnerability and Exploits
Answer:- 2. Common Vulnerabilities and Exposures
Q:2. Which of the following it was incorrect for Target company attack?
1. It is an example of server-side attack
2. More than 140 million credit card information was stolen in the attack
3. The attack happened in 2011
4. None of the above
Answer:- 3. The attack happened in 2011
Q:3. A format string is a ____ string that contains ___ and ____ parameters.
1. Format, text, ASCII
2. Text, ASCII, format
4. None of the above
Answer:-3. ASCII, text, format
Q:4. In ASLR, an attacker cannot jump directly to execute function.
1. True
2. False
Answer:-1. True
Q:5. Which of the following is incorrect with respect to FreeBSD jail?
1. It can only bind to sockets with specified IP address and authorized ports
2. It can communicate with processes inside and outside of jail
3. Root is limited (example: cannot load kernel modules)
4. None of the above
Answer:-3. Root is limited (example: cannot load kernel modules)
Q:6. Which of the following is not an attack tool
1. Password cracker
2. Network sniffer
3. Autorooter
4. Rootkit Revealer
Answer:-2. Network sniffer
Q:7. Which of the following information is contained in the access tokens?
1. The security identifier (SID) for the user’s account
2. A list of the privileges held by either the user or the user’s groups
3. The SID for the primary group
4. All of the above
Answer:-4. All of the above
Q:8. Cookies were originally designed for
1. Client-side programming
2. Server-side programming
3. Both Client-side programming and Server-side programming
4. None of the mentioned
Answer:-2. Server-side programming
Q:9. What of the following is a website vulnerability?
1. SQL Injection
2. CSRF
3. Cross Side Scripting
4. All of the above
Answer:-4. All of the above
Q:10. Some of cryptography protocols are :-
1. SSL
2. SET
3. IPSec
4. All of the above
Answer:-4. All of the above
Computer System Security Special Quiz Solution is given below. the solution of Computer System Security special Week Solution and all the answers are correct.
0 Comments
Don't be a stranger Just say hello, I will be happy to help you.