A security analyst is investigating a possible buffer overflow attack.
The following output was found on a user’s workstation:
graphic.linux_randomization.prg
Which of the following technologies would mitigate the manipulation of memory segments?
A . NX bit
B. ASLR
C. DEP
D. HSM
Answer: B
Explanation:
https://eklitzke.org/memory-protection-and-aslr
Latest CAS-004 Dumps Valid Version with 128 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund