ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 86 - CAS-004 discussion

Report
Export

A security analyst is investigating a possible buffer overflow attack. The following output was found on a user's workstation:

graphic.linux_randomization.prg

Which of the following technologies would mitigate the manipulation of memory segments?

A.
NX bit
Answers
A.
NX bit
B.
ASLR
Answers
B.
ASLR
C.
DEP
Answers
C.
DEP
D.
HSM
Answers
D.
HSM
Suggested answer: B

Explanation:

https://eklitzke.org/memory-protection-and-aslr

ASLR (Address Space Layout Randomization) is a technology that can mitigate the manipulation of memory segments caused by a buffer overflow attack. ASLR randomizes the location of memory segments, such as the stack, heap, or libraries, making it harder for an attacker to predict or control where to inject malicious code or overwrite memory segments. NX bit (No-eXecute bit) is a technology that can mitigate the execution of malicious code injected by a buffer overflow attack. NX bit marks certain memory segments as non-executable, preventing an attacker from running code in those segments. DEP (Data Execution Prevention) is a technology that can mitigate the execution of malicious code injected by a buffer overflow attack. DEP uses hardware and software mechanisms to mark certain memory regions as data-only, preventing an attacker from running code in those regions. HSM (Hardware Security Module) is a device that can provide cryptographic functions and key storage, but it does not mitigate the manipulation of memory segments caused by a buffer overflow attack. Verified

Reference: https://www.comptia.org/blog/what-is-aslr https://partners.comptia.org/docs/default-source/resources/casp-content-guide

asked 02/10/2024
Karabo Mabeba
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first