1
answer
1
watching
159
views
aminul2005Lv1
10 Feb 2022
@ Shilpa is saying A and then saying B ..... very confusing
@ofeliabangas is saying A
I am confused .... would you pls guide
A security analyst is investigating a possible buffer overflow attack. The following output was found on a user's workstation:
graphic.linux_randomization.prg
Which of the following technologies would mitigate the manipulation of memory segments?
Options: A NX bit
B ASLR
C DEP
D HSM
@ Shilpa is saying A and then saying B ..... very confusing
@ofeliabangas is saying A
I am confused .... would you pls guide
A security analyst is investigating a possible buffer overflow attack. The following output was found on a user's workstation:
graphic.linux_randomization.prg
Which of the following technologies would mitigate the manipulation of memory segments?
Options: A NX bit
B ASLR
C DEP
D HSM
Liked by aminul2005 and 1 others
10 Feb 2022