Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CISSP topic 1 question 138 discussion

Actual exam question from ISC's CISSP
Question #: 138
Topic #: 1
[All CISSP Questions]

Which of the following is the MOST common method of memory protection?

  • A. Error correction
  • B. Virtual local area network (VLAN) tagging
  • C. Segmentation
  • D. Compartmentalization
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
8b48948
2 weeks, 5 days ago
20 yrs in IT, never heard of memory segmentation, closest thing to it is containersation but dont know of any OS flavours you can actually carve up the available RAM.
upvoted 1 times
...
Soleandheel
5 months ago
Memory protection using segmentation is a method of dividing system memory into different segments to control and protect memory access. It is commonly used in x86 architecture systems, where the global descriptor table (GDT) and local descriptor table (LDT) are used to define memory segments and access permissions for different processes or segments of memory.
upvoted 1 times
...
74gjd_37
7 months, 3 weeks ago
Selected Answer: C
Segmentation (option C) is still the most common method of memory protection. While error correction (option A) is also a method used to protect memory from errors, it is not as commonly used as segmentation, because it requires expensive hardware (ECC memory and processors that support such memory). Segmentation is widely used in modern operating systems to partition memory into segments and to assign different levels of access permissions to each segment, which helps protect the system from unauthorized access and malicious attacks. Virtual local area network (VLAN) tagging (option B) is a network security technique used to partition a physical network into multiple virtual networks, and compartmentalization (option D) is a technique used to separate different types of data and processes into isolated compartments to reduce the impact of a security breach.
upvoted 2 times
...
Bach1968
10 months, 1 week ago
Selected Answer: C
The MOST common method of memory protection is segmentation. Segmentation refers to dividing the memory into logical segments or sections, each with its own access rights and permissions. This allows for the isolation and protection of different parts of memory, preventing unauthorized access or modification. Segmentation helps enhance the security and stability of the system by limiting the impact of errors or malicious activities within a specific memory segment.
upvoted 2 times
...
Jamati
1 year, 6 months ago
Selected Answer: C
Memory protection is a way to control memory access rights on a computer, and is a part of most modern instruction set architectures and operating systems. The x86 architecture has multiple segmentation features, which are helpful for achieving this memory protection. A segment is identified by a reference to a memory location and a segment descriptor may limit access rights, e.g., read only, only from certain rings.
upvoted 3 times
jackdryan
1 year ago
C is correct
upvoted 1 times
...
...
Rollizo
1 year, 7 months ago
Memory Protection using Segmentation: It is a method of dividing the system memory into different segments. The data structures of x86 architecture of OS like local descriptor table and global descriptor table are used in the protection of memory.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...