Solved

Refer to the Exhibit

Question 22

Multiple Choice

  Refer to the exhibit. After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)  A)  encapsulation B)  NOP sled technique C)  address space randomization D)  heap-based security E)  data execution prevention Refer to the exhibit. After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)


A) encapsulation
B) NOP sled technique
C) address space randomization
D) heap-based security
E) data execution prevention

Correct Answer:

verifed

Verified

Unlock this answer now
Get Access to more Verified Answers free of charge

Related Questions