707 views
0 votes
0 votes
ASLR randomizes

a.  The size of all arrays, thereby by making it difficult to perform buffer overflows

b. All instructions in the program

c. Positions of the stack, heap and libraries

d. Position  of all variables in the stack

1 Answer

0 votes
0 votes
ASLR randomizes  positions of the stack, heap and libraries to prevent buffer overflow attacks. Answer is C

Related questions

526
views
1 answers
1 votes
Suman Acharya asked Sep 19, 2017
526 views
Suppose a source code has bigger overflow vulnerabilities. Which of the following can cause buffer overflow vulnerabilities a. Scanf("%s",...) b. Strcpy(destination, source) ... Options are1. Only a2. b and c3. a and b4. All of the above
662
views
1 answers
0 votes
Suman Acharya asked Sep 14, 2017
662 views
In a mandatory access control, information from top secret object will not flow to secret and vice versaTrueFalse
294
views
1 answers
0 votes
Suman Acharya asked Sep 14, 2017
294 views
Match the following a. Secrecy. 1. Limit the resource usage. b Integrity 2. Unauthorized modification c availbility. 3. Unauthorized disclosure
510
views
1 answers
0 votes
Suman Acharya asked Sep 14, 2017
510 views
The number of gadgets present in the implementation depends on the number of C3 instruction in the machine codeTrueFalse