Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-215 Topic 2 Question 78 Discussion

Actual exam question for Cisco's 300-215 exam
Question #: 78
Topic #: 2
[All 300-215 Questions]

Refer to the exhibit.

After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: C, E

Contribute your Thoughts:

Lucy
5 months ago
Encapsulation? Really? That's not going to do much for a web app vulnerability. I'd go with C and E, and maybe throw in a joke about the engineer needing to 'randomize' their coffee breaks after this incident.
upvoted 0 times
Pamella
3 months ago
Haha, maybe the engineer should randomize their coffee breaks too!
upvoted 0 times
...
Galen
3 months ago
I agree. I think address space randomization and data execution prevention are better options.
upvoted 0 times
...
Jacqueline
3 months ago
Encapsulation won't help much with a web app vulnerability.
upvoted 0 times
...
Carisa
4 months ago
E) data execution prevention
upvoted 0 times
...
Merilyn
4 months ago
C) address space randomization
upvoted 0 times
...
Whitney
4 months ago
A) encapsulation
upvoted 0 times
...
...
Beatriz
5 months ago
Yes, address space randomization can help make it harder for attackers to predict memory layout.
upvoted 0 times
...
Stanton
5 months ago
I'm not sure about the NOP sled technique, but the other options seem relevant. Maybe the engineer should also consider implementing a web application firewall.
upvoted 0 times
Alberta
4 months ago
B) NOP sled technique might not be as effective in this scenario compared to other options.
upvoted 0 times
...
Rodrigo
4 months ago
Implementing a web application firewall is a great suggestion to enhance security.
upvoted 0 times
...
Farrah
4 months ago
E) data execution prevention could also help prevent similar attacks in the future.
upvoted 0 times
...
Joesph
4 months ago
A) encapsulation sounds like a good option to protect the web-based application.
upvoted 0 times
...
...
Shawnta
5 months ago
I believe address space randomization could also be a good technique to recommend.
upvoted 0 times
...
Salley
5 months ago
I agree with Beatriz, data execution prevention can help prevent similar attacks in the future.
upvoted 0 times
...
Amira
5 months ago
I think the answer is C) address space randomization and E) data execution prevention. These techniques help prevent the exploitation of vulnerabilities in web-based applications.
upvoted 0 times
Charlette
5 months ago
I think encapsulation and heap-based security could also be useful in preventing future attacks on the web-based application.
upvoted 0 times
...
Charlette
5 months ago
I agree with you, C) address space randomization and E) data execution prevention are important for protecting web-based applications.
upvoted 0 times
...
Willodean
5 months ago
Yes, those are the correct techniques to recommend for preventing attacks on web-based applications.
upvoted 0 times
...
Willodean
5 months ago
I agree, address space randomization and data execution prevention are crucial for protecting web-based applications.
upvoted 0 times
...
...
Beatriz
6 months ago
I think the engineer should recommend data execution prevention.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77