exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 614 discussion

Actual exam question from CompTIA's SY0-601
Question #: 614
Topic #: 1
[All SY0-601 Questions]

Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?

  • A. DLP
  • B. HIDS
  • C. EDR
  • D. NIPS
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kopeba3998
Highly Voted 1 year, 9 months ago
Selected Answer: C
B. HIDS can not prevent any buffer overflows. Answer is C. EDR
upvoted 14 times
...
Pineapple99
Highly Voted 1 year, 9 months ago
Selected Answer: C
The only solution in the answers that prevents in a host-level is the EDR. The HIDS can only detect and alert.
upvoted 5 times
...
Geronemo
Most Recent 1 year, 2 months ago
Selected Answer: C
The technical control best suited for the detection and prevention of buffer overflows on hosts is: C. EDR (Endpoint Detection and Response). Endpoint Detection and Response (EDR) solutions are designed to monitor and respond to suspicious activities on individual endpoints or hosts. They typically include features such as behavior monitoring, memory protection, and threat detection capabilities, which can help detect and prevent buffer overflow attacks. While Host-based Intrusion Detection Systems (HIDS) (option B) can also provide some level of detection for buffer overflows, EDR solutions offer more comprehensive capabilities for identifying and responding to such attacks, making them the better choice for this specific purpose.
upvoted 3 times
...
Kenken111
1 year, 3 months ago
Selected Answer: B
The best technical control among the options provided for the detection and prevention of buffer overflows on hosts is B. HIDS (Host-based Intrusion Detection System). HIDS is specifically designed to monitor and analyze the internals of a computing system as well as network packets on its way to or from the interface, which makes it well-suited for detecting abnormal behavior, such as buffer overflows, at the host level.
upvoted 1 times
...
Yomzie
1 year, 5 months ago
"...buffer overflows on hosts." EDR: Endpoint Detection and Response.
upvoted 3 times
...
mattjclark98
1 year, 6 months ago
Selected Answer: C
As state by Bob_Burgers: "Scans are automated. This is a credentialed scan. Good luck acknowledging 10,000 MFA push updates to one person each time the scanner logs in to an endpoint. Not a real world solution"
upvoted 2 times
...
Peshokp
1 year, 7 months ago
Selected Answer: C
For me is C : HIDS is a Detection System but doesn't have prevent functions. the question states "detection and prevention" so for me is EDR
upvoted 4 times
...
LuckyAro
1 year, 7 months ago
Selected Answer: B
Best technical control for the detection and prevention of buffer overflows on hosts is "B. HIDS," which stands for Host-based Intrusion Detection System. Buffer overflows are a common type of software vulnerability that can lead to security breaches. HIDS is designed to monitor and analyze activities and events on individual host systems, making it well-suited for detecting and potentially preventing buffer overflow exploits at the host level. HIDS can detect unusual or malicious behavior that may indicate a buffer overflow attempt, such as unexpected changes in memory or unauthorized code execution
upvoted 1 times
david124
1 year, 5 months ago
are you trolling? IDS detects IPS prevents. Since HIPS isn't an option C is the only possible answer
upvoted 2 times
...
...
azzawim
1 year, 7 months ago
Selected Answer: B
answer B
upvoted 1 times
...
Rassman
1 year, 8 months ago
What about NIPS. Wouldnt that prevent?
upvoted 2 times
DChilds
1 year, 8 months ago
The question is looking for a host based solution so I think it cancels NIPS out.
upvoted 3 times
...
...
sujon_london
1 year, 9 months ago
Selected Answer: B
Host-based Intrusion Detection System (HIDS) is a security solution that monitors and analyzes the activities on a particular machine it collects data from servers, computers, and other host systems, then analyzes the data for anomalies or suspicious activity. HIDS tools monitor the log files generated by applications and create a historical record of events on a computer device instead of the data traffic that passes through the computer HIDS can detect and alert on suspicious network traffic that may be indicative of a buffer overflow attack. It can also detect and prevent buffer overflow attacks by monitoring system calls and analyzing the behavior of running processes HIDS operates at the host level to monitor the computer infrastructure where it’s installed, analyze traffic, and log malicious activity. It examines events on a computer device instead of the data traffic that passes through the computer
upvoted 3 times
GovoriLind
1 year, 9 months ago
Are you considering that HIDS only detect and do not respond/prevent, the question is mentioning "prevent". A host intrusion detection system (HIDS) will give you deep visibility into what is happening on your critical system files. HID technologies are passive, aiming to identify suspicious activity but not prevent it. Therefore, HID solutions are used in conjunction with active intrusion prevention systems
upvoted 10 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...