Notifications
Clear all
Topic starter
A security analyst is investigating a possible buffer overflow attack.
The following output was found on a user’s workstation:
graphic.linux_randomization.prg
Which of the following technologies would mitigate the manipulation of memory segments?
- A . NX bit
B. ASLR
C. DEP
D. HSM
Suggested Answer: B
Explanation:
https://eklitzke.org/memory-protection-and-aslr
Explanation:
https://eklitzke.org/memory-protection-and-aslr
Posted : 28/10/2022 1:52 am