ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 241 - CS0-003 discussion

Report
Export

During a security test, a security analyst found a critical application with a buffer overflow vulnerability. Which of the following would be best to mitigate the vulnerability at the application level?

A.
Perform OS hardening.
Answers
A.
Perform OS hardening.
B.
Implement input validation.
Answers
B.
Implement input validation.
C.
Update third-party dependencies.
Answers
C.
Update third-party dependencies.
D.
Configure address space layout randomization.
Answers
D.
Configure address space layout randomization.
Suggested answer: B

Explanation:

Implementing input validation is the best way to mitigate the buffer overflow vulnerability at the application level. Input validation is a technique that checks the data entered by users or attackers against a set of rules or constraints, such as data type, length, format, or range. Input validation can prevent common web application attacks such as SQL injection, cross-site scripting (XSS), or command injection, which exploit the lack of input validation to execute malicious code or commands on the server or the client side. By validating the input before allowing submission, the web application can reject or sanitize any malicious or unexpected input, and protect the application from being compromised12.

Reference: How to detect, prevent, and mitigate buffer overflow attacks - Synopsys, How to mitigate buffer overflow vulnerabilities | Infosec

asked 02/10/2024
Koen Poos
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first