Which of the following security measures would be most effective against a memory exhaustion DoS attack?
A.
SPI Firewall
B.
Secure programming
C.
Checking user inputs
D.
Truncating buffers
Explanation:
Memory exhaustion happens when a flaw in an application allows the application to keep consuming more memory leaving none available for other applications. Answer option C is incorrect. Checking user inputs is an effective defense against SQL injection attacks, but not memory exhaustion attacks.Answer option D is incorrect. Truncating buffers is an effective defense against a buffer overflow attack, .but not against memory exhaustion attacks.
Answer option A is incorrect. An SPI firewall is effective in stopping a syn flood, but would not help against a memory exhaustion attack.