Question: 3
Which of the following is a common method used by malware to...
A financial services company recently discovered that an attacker exploited a buffer overflow vulnerability in one of its legacy C++ applications, allowing the injection and execution of malicious code within the application's memory space. To enhance the application's resilience against future memory injection attacks, the security team decides to implement multiple defense mechanisms. Which combination of the following security measures would most effectively mitigate the risk of memory injection attacks in this scenario?
Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! π
No comments yet. Be the first to comment!