
CTF - Quiz
Authored by Shiv Singh
Engineering
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Try to run the file command on a .png file, is the resolution mentioned in the output?
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What compiler would you use to compile a c++ program?
G++
GCC
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a conditional assembly instruction
JNZ
MOV
ADD
SUB
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does "PWN" mean in the context of cybersecurity?
To secure a system against attacks
To gain unauthorized control over a system by exploiting vulnerabilities
To encrypt sensitive data
To monitor network traffic
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the main cause of a buffer overflow?
Using too many variables in a program
Writing more data into a buffer than it can hold
Incorrectly defining global variables
Using the wrong compiler flags
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which line in the following code snippet is vulnerable to buffer overflow?
char buffer;
strcpy(buffer, input);
printf("You entered: %s\n", buffer);
void vulnerable_function(char *input)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which OSINT tool /website is widely used for reverse image search?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?