ExamGecko
Question list
Search
Search

Question 572 - 156-315.81 discussion

Report
Export

Return oriented programming (ROP) exploits are detected by which security blade?

A.
Data Loss Prevention
Answers
A.
Data Loss Prevention
B.
Check Point Anti-Virus / Threat Emulation
Answers
B.
Check Point Anti-Virus / Threat Emulation
C.
Application control
Answers
C.
Application control
D.
Intrusion Prevention Software
Answers
D.
Intrusion Prevention Software
Suggested answer: B

Explanation:

Return-oriented programming (ROP) exploits are detected by Check Point Anti-Virus / Threat Emulation blade. ROP exploits are a type of code reuse attack that bypasses common exploit mitigation techniques such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR). Check Point Anti-Virus / Threat Emulation blade can detect and prevent ROP exploits using its behavioral analysis engine that monitors the execution flow of processes and identifies malicious patterns.

Reference: [Check Point Security Expert R81 Threat Prevention Administration Guide], page 17.

asked 16/09/2024
Piroon Dechates
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first