Which security feature blocks execution in a non-executable memory location?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which security feature blocks execution in a non-executable memory location?

Explanation:
Data Execution Prevention blocks execution in memory locations that aren’t meant to run code. It uses the processor’s NX (or XD) bit to mark pages as non-executable, so even if an attacker injects code into regions like the stack or heap, the CPU will not execute it. This directly stops many common exploits such as buffer overflows and return-oriented programming by preventing code from running where it shouldn’t. The other options address different goals: ASLR makes it harder to predict where code and data live, complicating exploits but not inherently stopping execution; UAC controls privilege elevation for user actions; Secure Boot ensures the system boots with trusted software, not runtime memory execution rights.

Data Execution Prevention blocks execution in memory locations that aren’t meant to run code. It uses the processor’s NX (or XD) bit to mark pages as non-executable, so even if an attacker injects code into regions like the stack or heap, the CPU will not execute it. This directly stops many common exploits such as buffer overflows and return-oriented programming by preventing code from running where it shouldn’t. The other options address different goals: ASLR makes it harder to predict where code and data live, complicating exploits but not inherently stopping execution; UAC controls privilege elevation for user actions; Secure Boot ensures the system boots with trusted software, not runtime memory execution rights.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy