Symantec Endpoint Security Complete - R2 Technical Specialist 250-580 Question # 35 Topic 4 Discussion

Symantec Endpoint Security Complete - R2 Technical Specialist 250-580 Question # 35 Topic 4 Discussion

250-580 Exam Topic 4 Question 35 Discussion:
Question #: 35
Topic #: 4

How does Memory Exploit Mitigation protect applications?


A.

Injects a DLL(IPSEng32.dllorIPSEng64.dll)into protected processes and when an exploit attempt is detected, terminates the protected process to prevent the malicious code from running.


B.

Injects a DLL(UMEngx86.dll)into applications that run in user mode and if the application behaves maliciously, then SEP detects it.


C.

Injects a DLL (sysfer.dll) into processes being launched on the machine and if the process isn't trusted, prevents the process from running.


D.

Injects a DLL(IPSEng32.dll)into browser processes and protects the machine from drive-by downloads.


Get Premium 250-580 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.