250+ Understanding Attack Vectors part-20

Que.Which of the following is not a proper use of RE for ethical hackers?
a. Check for poorly designed protocols
b. Check for error conditions
c. Cracking for making paid apps free for use
d. Testing for boundary conditions
Que.________________ is the opposite of assembler.
a. Reassembler
b. Disassembler
c. Compiler
d. Interpreter
Que.______________ comes under tools for reverse engineering (RE).
a. Reassembler
b. Compiler
c. Disassembler
d. Interpreter
Que.De-compilation is not done for _______________
a. Recovery of lost source code
b. Migration of assembly language
c. Determining the existence of malicious code in any app
d. Targeting users with stealing code
Que.Which of the following is not a disassembler tool?
a. IDA Pro
b. PE Explorer
c. Turbo C
d. W32DASM
Que.There are ______ types of reverse engineering methodologies.
a. 6
b. 2
c. 5
d. 3
Que.Which of the following is not an actual Reverse Engineering tool?
a. Debugger
b. Disassembler
c. Text Editor
d. Hex Editor
Que.Hex editors permit programmers to inspect & alter binaries based on some software requirements.
a. True
b. False
c. May be True or False
d. Can’t say
Que.PE & Resource Viewer permits programmers to inspect & alter resources which are entrenched in the EXE file of any software.
a. PE & Resource Viewer
b. Debugger
c. Disassembler
d. Hex Editor
Que.IDAPro is used as a _________________ in manual binary code analysis and also used a debugger.
a. PE & Resource Viewer
b. Debugger
c. Disassembler
d. Hex Editor