Reference no: EM133440419
Questions
1. Which of the following is a practical difference between RISC and CISC architectures?
Instructions for CISC systems are not all the same size, making executables for CISC systems harder to parse while reverse engineering.
RISC architectures have more instructions than CISC architectures.
RISC processors typically use more registers to store data, reducing the need for memory accesses and resulting in faster execution times, while CISC processors use fewer registers.
Instructions for RISC systems are not all the same size, making executables for RISC systems harder to parse while reverse engineering.
2. x64 binaries can run on x86 architectures.
True
False
3. ARM assembly is primarily used in mobile computing because it is energy efficient.
True
False
4. Which type of system would most likely to be infected with malware that uses MIPS?
A mobile device
An Internet of Things device
A laptop or desktop
An older laptop or desktop, likely running a legacy operating system
5. Which best describes shellcode?
A series of machine code instructions often used as a part of an exploit or malware
A type of malware that is designed to exploit vulnerabilities in computer systems.
A programming language used to develop web applications and dynamic websites.
A software tool used to automate repetitive tasks in the command line interface.
6. Which of the following is not a region of memory allocated to a process?
The stack/heap, which contains temporary data used at run-time
The text portion, which contains eecutable code
The data portion, which contains global variables
The PE header, which information about the ifle typeand layout.
7. Which of the following best describes an opcode?
A binary code that represents a specific operation to be performed by a processor.
A hardware component used to store data and program instructions in a computer system.
A type of malicious software designed to steal data or disrupt computer systems.
A high-level programming language used for web development and server-side scripting.
8. Which of the following best describes the role of the parser in a compiler?
It verifies that the source code being compiled follows the rules of the programming language.
It optimizes the performance of the compiled code
It generates executable code from the source code.
It links the compiled code with external libraries and resources.
9. Which of the following statements best describes the difference between C and Java compilation?
C code and Java code are both compiled into machine code that can be executed directly by a processor.
C code and Java code are both interpreted and executed directly by a processor
C code is compiled into machine code that can be executed directly by a processor, while Java code is compiled into bytecode that is executed by a Java Virtual Machine (JVM).
C code is compiled into bytecode that is executed by a C Virtual Machine (CVM), while Java code is compiled into machine code that can be executed directly by a processor.