Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-215 Topic 8 Question 69 Discussion

Actual exam question for Cisco's 300-215 exam
Question #: 69
Topic #: 8
[All 300-215 Questions]

Refer to the exhibit.

After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: C, E

Contribute your Thoughts:

Shenika
7 months ago
So, address space randomization and data execution prevention are both good options for migration after the attack.
upvoted 0 times
...
Sharen
7 months ago
I think data execution prevention is also important to prevent code execution in specific parts of memory.
upvoted 0 times
...
Karl
7 months ago
What about data execution prevention? Shouldn't we consider that as well?
upvoted 0 times
...
Moon
7 months ago
I agree, it can help prevent similar attacks by randomizing the memory layout.
upvoted 0 times
...
Shenika
7 months ago
I think we should recommend address space randomization for migration.
upvoted 0 times
...
Marg
8 months ago
Seriously, Ty, who even uses NOP sleds these days? That's so old-school. I'd go with C and E as well. Gotta keep up with the latest security best practices, you know?
upvoted 0 times
...
Ty
8 months ago
Haha, encapsulation and NOP sled technique? Really? Those are way off the mark. Nice try, exam writers, but we're not falling for those distractors.
upvoted 0 times
Cristy
8 months ago
E) data execution prevention is crucial
upvoted 0 times
...
Layla
8 months ago
D) heap-based security could be useful
upvoted 0 times
...
Francesco
8 months ago
C) address space randomization might help
upvoted 0 times
...
Daniel
8 months ago
B) NOP sled technique is not effective here
upvoted 0 times
...
Valentine
8 months ago
A) encapsulation is important for security
upvoted 0 times
...
...
Tequila
8 months ago
I agree with Valentine. C and E make the most sense here. Address space randomization can help prevent the attacker from reliably exploiting the vulnerability, while data execution prevention can stop the malicious code from executing even if the attacker finds a way in.
upvoted 0 times
...
Valentine
8 months ago
Hmm, this question seems to be testing our understanding of security mitigation techniques. I'm thinking the answer might be C) address space randomization and E) data execution prevention. Those seem like the most relevant options to address the availability violation caused by the vulnerability in the web application.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77