Que.Which of the following is not a proper use of RE for ethical hackers?
|
a. Check for poorly designed protocols |
b. Check for error conditions |
c. Cracking for making paid apps free for use |
d. Testing for boundary conditions |
Cracking for making paid apps free for use
Que.________________ is the opposite of assembler.
|
a. Reassembler |
b. Disassembler |
c. Compiler |
d. Interpreter |
Que.______________ comes under tools for reverse engineering (RE).
|
a. Reassembler |
b. Compiler |
c. Disassembler |
d. Interpreter |
Que.De-compilation is not done for _______________
|
a. Recovery of lost source code |
b. Migration of assembly language |
c. Determining the existence of malicious code in any app |
d. Targeting users with stealing code |
Targeting users with stealing code
Que.Which of the following is not a disassembler tool?
|
a. IDA Pro |
b. PE Explorer |
c. Turbo C |
d. W32DASM |
Que.There are ______ types of reverse engineering methodologies.
|
a. 6 |
b. 2 |
c. 5 |
d. 3 |
Que.Which of the following is not an actual Reverse Engineering tool?
|
a. Debugger |
b. Disassembler |
c. Text Editor |
d. Hex Editor |
Que.Hex editors permit programmers to inspect & alter binaries based on some software requirements.
|
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.PE & Resource Viewer permits programmers to inspect & alter resources which are entrenched in the EXE file of any software.
|
a. PE & Resource Viewer |
b. Debugger |
c. Disassembler |
d. Hex Editor |
Que.IDAPro is used as a _________________ in manual binary code analysis and also used a debugger.
|
a. PE & Resource Viewer |
b. Debugger |
c. Disassembler |
d. Hex Editor |