New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSEC Exam - Topic 5 Question 76 Discussion

Actual exam question for GIAC's GSEC exam
Question #: 76
Topic #: 5
[All GSEC Questions]

You are reviewing a packet capture file from your network intrusion detection system. In the packet stream, you come across a long series of "no operation" (NOP) commands. In addition to the NOP commands, there appears to be a malicious payload. Of the following, which is the most appropriate preventative measure for this type of attack?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Dorcas
18 hours ago
Surprised to see NOPs in a packet capture, that's a red flag!
upvoted 0 times
...
Dorothy
6 days ago
I think D might help too, but not sure.
upvoted 0 times
...
Queenie
11 days ago
Definitely B, boundary checks are key!
upvoted 0 times
...
Tiara
16 days ago
NOPs are often used in buffer overflow attacks.
upvoted 0 times
...
Chanel
21 days ago
Haha, imagine trying to stop a NOP attack with file permissions. That's like using a spoon to dig a hole. B) is the way to go, no doubt.
upvoted 0 times
...
Alease
27 days ago
A) Limits on the number of failed logins? Nah, that's not gonna cut it. This is a job for some good old-fashioned boundary checks, baby!
upvoted 0 times
...
Pete
1 month ago
D) Restrictions on file permissions? Really? That's like putting a band-aid on a bullet wound. B) is clearly the right choice here.
upvoted 0 times
...
Rex
1 month ago
I keep mixing up the different types of attacks, but I don't think file permissions would help with NOP sleds. It has to be something more specific to input handling.
upvoted 0 times
...
Germaine
1 month ago
I'm not entirely sure, but I feel like failed login limits wouldn't really apply here since this seems more about exploiting memory.
upvoted 0 times
...
Marshall
2 months ago
I remember studying about buffer overflow attacks, and NOPs are often used in those scenarios. I think it might relate to boundary checks on inputs.
upvoted 0 times
...
Crista
2 months ago
Whoa, this is a tricky one. I'm leaning towards B, but I'm not 100% confident. Guess I'll have to think it through carefully on the exam.
upvoted 0 times
...
Von
2 months ago
Ugh, buffer overflows are the worst. I'm going to go with B, boundary checks, to stop that malicious payload from running. Seems like the best option to me.
upvoted 0 times
...
Lauran
2 months ago
Hmm, I'd say C) Controls against time of check/time of use attacks. Sounds like the best way to stop that NOP nonsense.
upvoted 0 times
...
Jerry
2 months ago
Okay, I think I got this. The NOP commands are setting up a buffer overflow, so B is the right answer here. Gotta watch out for those input validation issues.
upvoted 0 times
...
Yasuko
2 months ago
B) Boundary checks on program inputs is the way to go. Gotta keep those nasty payloads out!
upvoted 0 times
...
Brittney
3 months ago
I like B too. It directly addresses the exploit method used.
upvoted 0 times
...
Martha
3 months ago
I practiced a question similar to this, and I think the right answer is about input validation. So, maybe option B?
upvoted 0 times
...
Elza
3 months ago
Hmm, I'm not sure about this one. The NOP sled is throwing me off. Maybe C - controls against time of check/time of use attacks could work?
upvoted 0 times
...
Margart
3 months ago
This looks like a buffer overflow attack. I'd go with B - boundary checks on program inputs to prevent the malicious payload from executing.
upvoted 0 times
...

Save Cancel