Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


WHAT IS DATA EXECUATION PREVANTION



WHAT IS DATA EXECUATION PREVANTION..

Answer / vinod kumar

Data Execution Prevention (DEP) is a security feature
included in modern Microsoft Windows operating systems (
introduced in Win XP SP 2 ) that is intended to prevent an
application or service from executing code from a
non-executable memory region. This helps prevent certain
exploits that store code via a buffer overflow, for example.
DEP runs in two modes: hardware-enforced DEP for CPUs that
can mark memory pages as nonexecutable, and
software-enforced DEP with a limited prevention for CPUs
that do not have hardware support. Software-enforced DEP
does not protect from execution of code in data pages, but
instead from another type of attack (SEH overwrite).

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More Networking Security Interview Questions

In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

0 Answers  


What are the different types of vpns?

0 Answers  


What protects the Clark Wilson model?

1 Answers   Airtel,


Name the port used by PING.

0 Answers  


What is mesh network

0 Answers   Elgi Equipments,


What is adware?

0 Answers  


Can you give me some ransomware variants?

0 Answers  


What is multicasting?

0 Answers  


What are digital signatures and smart cards?

0 Answers  


How long can a ddos attack last?

0 Answers  


What is the role of single sign on in authentication technologies?

0 Answers  


What is udp flood?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)