- (Exam Topic 13)
Which of the following is the MOST common method of memory protection?
Correct Answer:
B
- (Exam Topic 14)
Following a penetration test, what should an organization do FIRST?
Correct Answer:
D
- (Exam Topic 11)
Secure Sockets Layer (SSL) encryption protects
Correct Answer:
C
- (Exam Topic 14)
What is the BEST method if an investigator wishes to analyze a hard drive which may be used as evidence?
Correct Answer:
C
- (Exam Topic 14)
Which of the following techniques BEST prevents buffer overflows?
Correct Answer:
B
Some products installed on systems can also watch for input values that might result in buffer overflows, but the best countermeasure is proper programming. This means use bounds checking. If an input value is only sup-posed to be nine characters, then the application should only accept nine characters and no more. Some languages are more susceptible to buffer overflows than others, so programmers should understand these issues, use the right languages for the right purposes, and carry out code review to identify buffer overflow vulnerabilities.