The technical control best suited for the detection and prevention of buffer overflows on hosts is:
C. EDR (Endpoint Detection and Response).
Endpoint Detection and Response (EDR) solutions are designed to monitor and respond to suspicious activities on individual endpoints or hosts. They typically include features such as behavior monitoring, memory protection, and threat detection capabilities, which can help detect and prevent buffer overflow attacks.
While Host-based Intrusion Detection Systems (HIDS) (option B) can also provide some level of detection for buffer overflows, EDR solutions offer more comprehensive capabilities for identifying and responding to such attacks, making them the better choice for this specific purpose.
The best technical control among the options provided for the detection and prevention of buffer overflows on hosts is B. HIDS (Host-based Intrusion Detection System).
HIDS is specifically designed to monitor and analyze the internals of a computing system as well as network packets on its way to or from the interface, which makes it well-suited for detecting abnormal behavior, such as buffer overflows, at the host level.
As state by Bob_Burgers: "Scans are automated. This is a credentialed scan. Good luck acknowledging 10,000 MFA push updates to one person each time the scanner logs in to an endpoint. Not a real world solution"
Best technical control for the detection and prevention of buffer overflows on hosts is "B. HIDS," which stands for Host-based Intrusion Detection System.
Buffer overflows are a common type of software vulnerability that can lead to security breaches. HIDS is designed to monitor and analyze activities and events on individual host systems, making it well-suited for detecting and potentially preventing buffer overflow exploits at the host level. HIDS can detect unusual or malicious behavior that may indicate a buffer overflow attempt, such as unexpected changes in memory or unauthorized code execution
Host-based Intrusion Detection System (HIDS) is a security solution that monitors and analyzes the activities on a particular machine it collects data from servers, computers, and other host systems, then analyzes the data for anomalies or suspicious activity. HIDS tools monitor the log files generated by applications and create a historical record of events on a computer device instead of the data traffic that passes through the computer
HIDS can detect and alert on suspicious network traffic that may be indicative of a buffer overflow attack. It can also detect and prevent buffer overflow attacks by monitoring system calls and analyzing the behavior of running processes
HIDS operates at the host level to monitor the computer infrastructure where it’s installed, analyze traffic, and log malicious activity. It examines events on a computer device instead of the data traffic that passes through the computer
Are you considering that HIDS only detect and do not respond/prevent, the question is mentioning "prevent".
A host intrusion detection system (HIDS) will give you deep visibility into what is happening on your critical system files. HID technologies are passive, aiming to identify suspicious activity but not prevent it. Therefore, HID solutions are used in conjunction with active intrusion prevention systems
upvoted 10 times
...
...
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
kopeba3998
Highly Voted 1 year, 9 months agoPineapple99
Highly Voted 1 year, 9 months agoGeronemo
Most Recent 1 year, 2 months agoKenken111
1 year, 3 months agoYomzie
1 year, 5 months agomattjclark98
1 year, 6 months agoPeshokp
1 year, 7 months agoLuckyAro
1 year, 7 months agodavid124
1 year, 5 months agoazzawim
1 year, 7 months agoRassman
1 year, 8 months agoDChilds
1 year, 8 months agosujon_london
1 year, 9 months agoGovoriLind
1 year, 9 months ago