Notifications
Clear all
Topic starter
10/05/2022 8:54 pm
A security analyst is investigating a possible buffer overflow attack.
The following output was found on a user’s workstation:
graphic.linux_randomization.prg
Which of the following technologies would mitigate the manipulation of memory segments?
- A . NX bit
- B . ASLR
- C . DEP
- D . HSM
Suggested Answer: B
Explanation:
Reference: http://webpages.eng.wayne.edu/~fy8421/19sp-csc5290/labs/lab2-instruction.pdf (3)
Explanation:
Reference: http://webpages.eng.wayne.edu/~fy8421/19sp-csc5290/labs/lab2-instruction.pdf (3)