List of questions
Related questions
Question 572 - 156-315.81 discussion
Return oriented programming (ROP) exploits are detected by which security blade?
A.
Data Loss Prevention
B.
Check Point Anti-Virus / Threat Emulation
C.
Application control
D.
Intrusion Prevention Software
Your answer:
0 comments
Sorted by
Leave a comment first