List of questions
Related questions
Question 86 - CAS-004 discussion
A security analyst is investigating a possible buffer overflow attack. The following output was found on a user's workstation:
graphic.linux_randomization.prg
Which of the following technologies would mitigate the manipulation of memory segments?
A.
NX bit
B.
ASLR
C.
DEP
D.
HSM
Your answer:
0 comments
Sorted by
Leave a comment first