exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 65 discussion

Actual exam question from Cisco's 200-201
Question #: 65
Topic #: 1
[All 200-201 Questions]

Which action prevents buffer overflow attacks?

  • A. variable randomization
  • B. using web based applications
  • C. input validation
  • D. using a Linux operating system
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Twphill
6 months, 1 week ago
Selected Answer: C
Buffer overflow attacks are prevented by input validation.
upvoted 2 times
...
RoBery
1 year, 3 months ago
c Buffer overflow attacks can be prevented by implementing proper input validation & boundary checking in software, using secure coding practices, applying compiler-based protections like stack canaries & Address Space Layout Randomization [ASLR] & keeping software up to date with security patches.
upvoted 2 times
...
Faio
1 year, 6 months ago
The answer is: C. input validation.
upvoted 3 times
...
Topsecret
1 year, 9 months ago
The action that can help prevent buffer overflow attacks is: C. input validation Buffer overflow attacks occur when a program or application attempts to write data beyond the boundaries of a buffer, leading to overwriting adjacent memory areas. This can be exploited by an attacker to inject and execute malicious code. Input validation refers to the process of checking and validating user input to ensure it meets the expected criteria and does not exceed the allocated buffer size. By implementing proper input validation techniques, such as length checks, input sanitization, and boundary checks, developers can prevent buffer overflow vulnerabilities.
upvoted 3 times
...
Isuckatexams
1 year, 10 months ago
Selected Answer: A
Several measures can be taken to prevent buffer overflows. These include address space layout randomization (ASLR), data execution prevention, and operating system runtime protections. ASLR is a technique that makes it harder for an attacker to predict where code will be executed in memory
upvoted 2 times
...
Eng_ahmedyoussef
2 years, 6 months ago
Selected Answer: C
C is correct (input sanitization)
upvoted 3 times
...
halamah
3 years, 5 months ago
C IS CORRECT (input validation)
upvoted 2 times
...
Dion_Weby
3 years, 5 months ago
Input validation or input sanitization?
upvoted 3 times
joseph267
2 years, 9 months ago
both are kind of similar however What is input sanitisation? Input sanitisation checks data that is entered and removes anything that might be potentially dangerous. A good example of this is on a website form. A hacker might try to gain access to a website's data through a SQL injection attack. What is input validation? Input validation is the process of testing input received by the application for compliance against a standard defined within the application. It can be as simple as strictly typing a parameter and as complex as using regular expressions or business logic to validate input.
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago