40 likes | 144 Views
Address space randomization helps prevent which components of buffer overflow attacks? A: overwriting program variables B: hijacking the control flow C: executing arbitrary code. Non-executable stacks help prevent which component of buffer overflow attacks? A: overwriting program variables
E N D
Address space randomization helps prevent which components of buffer overflow attacks? • A: overwriting program variables • B: hijacking the control flow • C: executing arbitrary code
Non-executable stacks help prevent which component of buffer overflow attacks? • A: overwriting program variables • B: hijacking the control flow • C: executing arbitrary code
Return-to-libc is a countermeasure to foil which buffer overflow defense? • A: Address space randomization • B: Non-executable stack • C: libsafe
If an IDS reports an attack when only benign actions occur, this is an example of a: • A: false positive • B: false negative • C: evasion