exam questions

Exam CAS-003 All Questions

View all questions & answers for the CAS-003 exam

Exam CAS-003 topic 1 question 61 discussion

Actual exam question from CompTIA's CAS-003
Question #: 61
Topic #: 1
[All CAS-003 Questions]

A company is developing requirements for a customized OS build that will be used in an embedded environment. The company procured hardware that is capable of reducing the likelihood of successful buffer overruns while executables are processing. Which of the following capabilities must be included for the OS to take advantage of this critical hardware-based countermeasure?

  • A. Application whitelisting
  • B. NX/XN bit
  • C. ASLR
  • D. TrustZone
  • E. SCP
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
GDS
Highly Voted 5 years ago
B. NX/XN bit. It's purpose is to segregate memory areas used for processor instruction and data storage. ASLR was implemented in 2003. No special hardware is needed for it today. Question implies that they had to buy the correct hardware. Only processors of the Harvard architecture had the NX bit option, now processors of the von Neumann are adopting NX. NX is the term for ARM, it's XD for Intel, and EVP for AMD.
upvoted 10 times
...
tirajvid
Most Recent 1 year, 5 months ago
Selected Answer: C
Address space layout randomization (ASLR) is a technique that is used to increase the difficulty of performing a buffer overflow attack that requires the attacker to know the location of an executable in memory.
upvoted 1 times
...
lmao
3 years, 9 months ago
keyword = embedded environment - NX bit
upvoted 1 times
...
americaman80
4 years, 1 month ago
It's B
upvoted 1 times
...
justaguy90
4 years, 5 months ago
B. NX/XN bit. This has to be included for the already procured hardware to properly operate. From Wikipedia: An operating system with support for the NX bit may mark certain areas of memory as non-executable. The processor will then refuse to execute any code residing in these areas of memory. Used to prevent certain types of malicious software from taking over computers by inserting their code into another program's data storage area and running their own code from within this section; one class of such attacks is known as the buffer overflow attack.
upvoted 2 times
...
Rankin
4 years, 8 months ago
B is correct
upvoted 3 times
...
tek
5 years, 3 months ago
C. ASLR - Address space layout randomization (ASLR) is a computer security technique involved in preventing exploitation of memory corruption vulnerabilities. In order to prevent an attacker from reliably jumping to, for example, a particular exploited function in memory, ASLR randomly arranges the address space positions of key data areas of a process, including the base of the executable and the positions of the stack, heap and libraries.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...