A. Address Space Layout Randomization (ASLR)
ASLR randomizes the memory addresses of program components, making it difficult for attackers to predict the location of vulnerable functions or data structures in memory. This helps mitigate buffer overflow attacks by adding an additional layer of security.
Other techniques that can be used to protect against buffer overflow attacks include bounds checking, data execution prevention (DEP), address space layout randomization (ASLR), and code signing. It is recommended to use a combination of these techniques to provide comprehensive protection against buffer overflow attacks.
Address space layout randomization (ASLR) is a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory.
I go with B
The memory management unit (MMU) provides hardware-based memory protection that can prevent buffer overflow attacks from succeeding by ensuring that each program has its own virtual address space and by detecting illegal memory accesses.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
klarak
6 months, 3 weeks agoSoleandheel
11 months, 2 weeks agoSoleandheel
11 months, 2 weeks agoDelab202
1 year, 7 months agojackdryan
1 year, 6 months ago[Removed]
1 year, 7 months ago[Removed]
1 year, 7 months agoGoseu
1 year, 7 months agoSpaceMonkey1
1 year, 7 months agoRollingalx
1 year, 9 months ago