ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 140 - CS0-003 discussion

Report
Export

While performing a dynamic analysis of a malicious file, a security analyst notices the memory address changes every time the process runs. Which of the following controls is most likely preventing the analyst from finding the proper memory address of the piece of malicious code?

A.
Address space layout randomization
Answers
A.
Address space layout randomization
B.
Data execution prevention
Answers
B.
Data execution prevention
C.
Stack canary
Answers
C.
Stack canary
D.
Code obfuscation
Answers
D.
Code obfuscation
Suggested answer: A

Explanation:

The correct answer is A. Address space layout randomization.

Address space layout randomization (ASLR) is a security control that randomizes the memory address space of a process, making it harder for an attacker to exploit memory-based vulnerabilities, such as buffer overflows1. ASLR can also prevent a security analyst from finding the proper memory address of a piece of malicious code, as the memory address changes every time the process runs2.

The other options are not the best explanations for why the memory address changes every time the process runs. Data execution prevention (B) is a security control that prevents code from being executed in certain memory regions, such as the stack or the heap3. Stack canary © is a security technique that places a random value on the stack before a function’s return address, to detect and prevent stack buffer overflows. Code obfuscation (D) is a technique that modifies the source code or binary of a program to make it more difficult to understand or reverse engineer. These techniques do not affect the memory address space of a process, but rather the execution or analysis of the code.

asked 02/10/2024
Ronald Zegwaard
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first