Introduction To Operating Systems NPTEL Week 8 Assignment

These are solution for Introduction To Operating Systems NPTEL Week 8 Assignment

Course Name: Introduction To Operating Systems

Link of course: Click here


Q1) ASLR randomizes the position of all variables in the stack and thereby making it difficult to perform buffer overflows.
a. True
b. False

Answer: a. True


Q2) Match the following
a)Gadget         1) pseudo random number which detects buffer overflow
b)Canaries        2) Short sequence of instructions ending in a return
c)Shellcode      3) May execute in the stack if the NX bit is disabled
d)ASLR            4) helps prevent ROP attacks

a. a-4, b-3, c-2, d-1
b. a-2, b-1, c-4, d-3
c. a-1, b-2, c-4, d-3
d. a-2, b-1 c-3, d-4

Answer: c. a-1, b-2, c-4, d-3


These are solution for Introduction To Operating Systems NPTEL Week 8 Assignment


Q3) How does the NX bit prevent buffer overflow attacks?
a. It prevents buffers from overflowing
b. It prevents certain code from executing in data segments
c. It prevents the return address in the stack being replaced by an arbitrary location
d. All of the above

Answer: d. All of the above


Q4) An ROP attack can potentially be detected at run-time by
a. Canaries
b. The number of return statements executed in the processor
c. The number of return statements present in the executable
d. By a non-executable stack

Answer: c. The number of return statements present in the executable


These are solution for Introduction To Operating Systems NPTEL Week 8 Assignment


Q5) In the Bell-Lapadula model, information from top secret object will not flow to secret clearance.
a. True
b. False

Answer: b. False


Q6) A user X with secret clearance decides to transfer information to a third party Y and Y tries to make changes in the confidential class.
This breach of information can be prevented by _________________.

a. Implementing access control matrix
b. Implementing Bell-laPadula model
c. Implementing the Biba Model
d. None of the above

Answer: d. None of the above


These are solution for Introduction To Operating Systems NPTEL Week 8 Assignment


Q7) Programmer X has found that the source code has a buffer overflow vulnerability caused by strcpy instruction. He then used strncpy in place of strcpy to prevent buffer overflow vulnerabilities. Which of the following is True?
a. Buffer overflow vulnerabilities caused due to strcpy is avoided due to  bounds check
b. This will not make any changes in the source code
c. Buffer overflow attack will not occur in this source code
d. None of these

Answer: d. None of these


Q8) Consider the following commands in a system that supports discretionary access control.
Which one of the following statements is TRUE?
A.There is no leakage of rights due to these commands
B.A leakage may occur when an owner of an object, executes CONFERwrite command.
C.A leakage may occur when a user with write permissions, executes ADD_READ command

a. Only A is correct
b. Only B is correct
c. Only C is correct
d. Both B and C is correct

Answer: b. Only B is correct


These are solution for Introduction To Operating Systems NPTEL Week 8 Assignment


Q9) Your project manager asks you to ensure that a particular source code is free from buffer overflow vulnerabilities. Which of the following would you need to look out for.
a. scanf in the code
b. strcpy in the code
c. For loops that manipulate arrays
d. All of the above

Answer: b. strcpy in the code


These are solution for Introduction To Operating Systems NPTEL Week 8 Assignment


Q10) Arrange the following, based on the order  parameters are pushed onto the stack
a) Return address is pushed
b)The function call parameters
c)Previous frame pointers
d)Local variables are allocated

a) a, b, c, d
b) b, c, d, a
c) b, a , c, d
d) a, c, d, b

Answer: b) b, c, d, a


These are solution for Introduction To Operating Systems NPTEL Week 8 Assignment

All weeks of Introduction To Operating Systems: https://progies.in/answers/nptel/introduction-to-operating-systems

More NPTEL Solutions: https://progies.in/answers/nptel


* The material and content uploaded on this website are for general information and reference purposes only. Please do it by your own first. COPYING MATERIALS IS STRICTLY PROHIBITED.


More from PROGIEZ

These are solution for Introduction To Operating Systems NPTEL Week 8 Assignment