Which of the following tools can be used as a countermeasure to such an attack?

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code.

The image given below explains this phenomenon:

Which of the following tools can be used as a countermeasure to such an attack?
A . SmashGuard
B . Obiwan
C . Kismet
D . Absinthe

Answer: A

Latest GPPA Dumps Valid Version with 285 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments