Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-215 Topic 10 Question 71 Discussion

Actual exam question for Cisco's 300-215 exam
Question #: 71
Topic #: 10
[All 300-215 Questions]

Refer to the exhibit.

After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: C, E

Contribute your Thoughts:

Chauncey
3 months ago
I believe data execution prevention should also be recommended for added security.
upvoted 0 times
...
Verlene
4 months ago
I agree with you, it can help prevent similar attacks in the future.
upvoted 0 times
...
Cecilia
4 months ago
I think the engineer should recommend address space randomization.
upvoted 0 times
...
Teddy
4 months ago
Yes, that's a good point. It can help protect against code injection attacks.
upvoted 0 times
...
Rosendo
5 months ago
I also think data execution prevention should be recommended for added security.
upvoted 0 times
...
Lajuana
5 months ago
I agree with that, it can help prevent similar attacks in the future.
upvoted 0 times
...
Teddy
5 months ago
I think the engineer should recommend address space randomization.
upvoted 0 times
...
Armando
6 months ago
Haha, yeah, the NOP sled technique? That's more like something you'd see in a hacker movie, not a real-world security solution. I'm pretty confident that address space randomization and data execution prevention are the correct answers here.
upvoted 0 times
...
Ashley
6 months ago
Hmm, I agree that address space randomization and data execution prevention are probably the way to go. Those are commonly used to protect against code execution vulnerabilities in web apps. *chuckles* I wonder if the exam writers are trying to trick us with those other options.
upvoted 0 times
...
Jani
6 months ago
You're on the right track, but I'm not sure about encapsulation and the NOP sled technique being the best choices here. Those seem more related to low-level exploit techniques rather than defensive measures.
upvoted 0 times
Brett
5 months ago
User 3
upvoted 0 times
...
Coleen
5 months ago
User 2
upvoted 0 times
...
Lizette
5 months ago
User 1
upvoted 0 times
...
...
Gabriele
6 months ago
This question seems to be focused on security measures to mitigate a web application vulnerability. I'm not entirely sure about the correct answers, but I think address space randomization and data execution prevention could be good options.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77