adplus-dvertising
frame-decoration

Question

Which of the following is not a function or use of disassembler?

a.

Extracting functions & libraries

b.

Extracting strings and values

c.

Assemble medium-level codes

d.

Dissect binary codes

Posted under Cyber Security

Answer: (c).Assemble medium-level codes

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of the following is not a function or use of disassembler?

Similar Questions

Discover Related MCQs

Q. Which of the following is not a feature of IDAPro?

Q. A _____________ takes executable file as input and tries to generate high level code.

Q. ________________ does not attempt to reverse the actions of compiler; rather it transforms the input program repeatedly until HLL code is achieved.

Q. _____________ will not recreate the original source file created by the compiler.

Q. Which of the following is not a decompiler tool?

Q. REC stands for ________________

Q. _______________ is a universal interactive program environment for reverse engineering.

Q. Which one is not an example of .Net application decompiler?

Q. __________ is a naming system given to different computers which adapt to human-readable domain names.

Q. DNS stands for _____________

Q. Some security issues might exist owing to misconfigured __________________ which can direct to disclosure of information regarding the domain.

Q. ______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings.

Q. _____________ can be attained by the use of malware or by changing the server’s settings.

Q. There are _________ main types of DNS hijacking.

Q. DNS trojans are used for performing a type of DNS hijacking.

Q. The _______________ matches and maps to the user friendly domain name.

Q. Which of the following is not an example of DNS hijacking?

Q. A ______________ is essentially a text file residing on the server that hosts different domain containing entries for dissimilar resource records.

Q. ______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet.

Q. DNS poisoning is very dangerous because it can extend its reach from one ___________ to another.