1.
The Authentication Header (AH) is used to provide connectionless integrity and data origin authentication for IP datagrams (hereafter referred to as just “authentication”), and to provide protection against replays. Which of the following is correct about authentication header (AH)?
Correct Answer
A. The authentication information is a keyed hash based on all of the bytes in the packet.
Explanation
The authentication information in the Authentication Header (AH) is a keyed hash based on all of the bytes in the packet. This means that the authentication information is generated by applying a hash function to all the bytes in the packet, using a secret key. This ensures that any modification to the packet will result in a different hash value, providing connectionless integrity. Additionally, the use of a secret key ensures data origin authentication, as only the sender with the correct key can generate the correct hash value.
2.
Which port must be open to allow a user to login remotely onto a workstation?
Correct Answer
A. 3389
Explanation
Port 3389 must be open to allow a user to login remotely onto a workstation. This port is used by the Remote Desktop Protocol (RDP), which allows users to connect to and control a remote computer over a network connection. By opening port 3389, the necessary communication can take place between the user's device and the remote workstation, enabling remote login functionality. Ports 8080, 636, and 53 are used for different purposes and not specifically for remote login, making them incorrect answers.
3.
Which of the following is the best description about the method of controlling how and when users can connect in from home?
Correct Answer
B. Remote access policy
Explanation
A remote access policy is a set of rules and guidelines that dictate how and when users can connect to a network remotely from their homes. It outlines the authentication methods, security protocols, and access privileges that are allowed for remote connections. This policy ensures that only authorized users can connect to the network and helps to protect sensitive data from unauthorized access. It is the best description for controlling how and when users can connect from home as it provides a comprehensive framework for managing remote access to a network.
4.
Remote authentication allows you to authenticate Zendesk users using a locally hosted script. Which of the following is an example of remote authentication?
Correct Answer
D. A user in one city logs onto a network in another city
Explanation
Remote authentication refers to the process of authenticating users using a locally hosted script. In this scenario, the example of remote authentication is when a user in one city logs onto a network in another city. This means that the user is accessing a network that is physically located in a different location, and they are able to authenticate themselves using a username and password pair. This type of authentication allows users to securely access resources and services from a remote location, ensuring that only authorized individuals can gain access to the network.
5.
You work as the security administrator at your company. You must configure the firewall to support TACACS. Which port(s) should you open on the firewall?
Correct Answer
A. Port 49
Explanation
To support TACACS, the firewall needs to have Port 49 open. TACACS (Terminal Access Controller Access-Control System) is a remote authentication protocol that allows network devices to communicate with a central authentication server. Port 49 is the designated port for TACACS communication, so opening this port on the firewall will enable the necessary communication between the devices and the authentication server. Ports 161, 21, and 53 are not relevant to TACACS and do not need to be opened for this purpose.
6.
Which of the following definitions fit correctly to TACACS?
Correct Answer
C. It allows credentials to be accepted from multiple methods, including Kerberos
7.
Which item can easily create an unencrypted tunnel between two devices?
Correct Answer
B. L2TP
Explanation
L2TP (Layer 2 Tunneling Protocol) can easily create an unencrypted tunnel between two devices. L2TP is a protocol that allows the creation of virtual private networks (VPNs) and enables the secure transmission of data over the internet. However, by default, L2TP does not provide encryption, so it can easily create an unencrypted tunnel between devices. It is important to note that for secure communication, encryption should be added to the L2TP tunnel using additional protocols such as IPsec.
8.
Which of the following has largely replaced SLIP?
Correct Answer
C. PPP (Point to Point Protocol)
Explanation
PPP (Point to Point Protocol) has largely replaced SLIP (Serial Line Internet Protocol). SLIP was an older protocol used for establishing a direct connection between two devices over a serial line, typically for internet access. However, SLIP had limitations such as lack of error correction and authentication. PPP, on the other hand, is a more advanced protocol that provides error detection and correction, authentication, and multilink capabilities. It became the standard protocol for establishing internet connections and has largely replaced SLIP in modern networking environments. VPN (Virtual Private Network) is a separate technology used for secure remote access, not a replacement for SLIP. RADIUS (Remote Authentication Dial-In User Service) is a protocol used for centralized authentication, authorization, and accounting for remote access users, not a replacement for SLIP.
9.
Which authentication method does the following sequence: logon request, encrypts value response, server, challenge, compare encrypts results, authorize or fail referred to?
Correct Answer
D. CHAP
Explanation
The given sequence of logon request, encrypts value response, server challenge, compare encrypts results, authorize or fail refers to the CHAP (Challenge Handshake Authentication Protocol) authentication method. CHAP is a protocol used to authenticate a remote user or device to a network. It involves a challenge-response mechanism where the server sends a challenge to the client, the client encrypts the challenge with a shared secret, and the server compares the encrypted results to authenticate the client. If the results match, the client is authorized, otherwise, it fails.
10.
On a company’s LAN, port 3535 is typically blocked for outbound traffic. An end-user has recently purchased a legitimate business program that needs to make outbound calls through this port. Which step should be taken by a technician to allow this (Select TWO)
Correct Answer(s)
B. Open the port on the user’s personal software firewall
C. Open the port on the company’s firewall
Explanation
To allow the legitimate business program to make outbound calls through port 3535, the technician should take two steps. First, they should open the port on the user's personal software firewall. This will ensure that the program is not blocked by the user's own firewall settings. Secondly, the technician should open the port on the company's firewall. This will allow the program to communicate through the LAN and make outbound calls using port 3535.
11.
In a secure environment, which authentication mechanism will perform better?
Correct Answer
B. TACACS because it encrypt client-server negotiation dialogs
Explanation
TACACS will perform better in a secure environment because it encrypts client-server negotiation dialogs. This means that the communication between the client and server is encrypted, providing an additional layer of security. RADIUS also provides remote access authentication, but it specifically encrypts client-server passwords, which may not be as comprehensive as encrypting the entire negotiation dialogs. Therefore, TACACS is the better authentication mechanism in terms of security in this scenario.
12.
A VPN typically provides a remote access link from one host to another over:
Correct Answer
B. The Internet
Explanation
A VPN typically provides a remote access link from one host to another over the Internet. This means that users can securely connect to a private network from a remote location using the public Internet as the medium of communication. The VPN establishes a secure and encrypted connection, allowing users to access resources on the private network as if they were directly connected to it. This is a common method used by organizations to enable remote workers to securely access company resources.
13.
Which authentication method will prevent a replay attack from occurring?
Correct Answer
A. CHAP
Explanation
CHAP (Challenge Handshake Authentication Protocol) is an authentication method that prevents replay attacks from occurring. In CHAP, the server challenges the client to prove its identity by sending a random number, and the client responds with a hash of the challenge and its password. This process is repeated periodically to ensure continued authentication. By using a different challenge each time, CHAP prevents an attacker from replaying a previously captured authentication exchange, thereby preventing replay attacks.
14.
The CHAP (Challenge Handshake Authentication Protocol) sends a logon request from the client to the server, and the server sends a challenge back to the client. At which stage does the CHAP protocol perform the handshake process? Choose the best complete answer.
Correct Answer
B. At the stage when the connection is established and at which ever time after the connection has been established
Explanation
The CHAP protocol performs the handshake process at the stage when the connection is established and at any time after the connection has been established. This means that the logon request and challenge are sent during the initial connection setup, and the authentication process can continue to occur at any point after the connection has been established.
15.
A company has instituted a VPN to allow remote users to connect to the office. As time progresses multiple security associations are created with each association being more secure. Which of the following should be implemented to automate the selection of the BEST security association for each user?
Correct Answer
C. IKE
Explanation
To automate the selection of the BEST security association for each user in a VPN, IKE (Internet Key Exchange) should be implemented. IKE is a protocol used to establish a secure and authenticated connection between two devices. It allows the negotiation and selection of the appropriate security parameters, such as encryption algorithms (like 3DES or AES) and hashing algorithms (like SHA), based on the capabilities and requirements of the devices involved. By implementing IKE, the VPN can automatically determine and establish the most secure security association for each user, ensuring the highest level of security for the remote connections.
16.
Which of the following definitions fit correctly to PPTP?
Correct Answer
B. It supports encapsulation in a single point-to-point environment
Explanation
PPTP, or Point-to-Point Tunneling Protocol, supports encapsulation in a single point-to-point environment. This means that it is designed to create a secure connection between two devices or networks, allowing data to be transmitted safely over an untrusted network. It is commonly used for VPN (Virtual Private Network) connections, where it provides encryption and authentication for the data being transmitted between the client and the server. PPTP is not limited to UNIX systems and was not created by Cisco specifically for dial-up connections.
17.
Which of the following definitions fit correctly to RADIUS?
Correct Answer
C. Is a mechanism that allows authentication of dial-in and other network connections
Explanation
RADIUS is a mechanism that allows authentication of dial-in and other network connections. It is commonly used in remote access environments to authenticate users and authorize their access to a network. RADIUS provides a centralized authentication and authorization service, allowing users to connect to a network using various protocols such as PPP, Ethernet, and Wi-Fi. It is widely used in enterprise networks, ISPs, and wireless networks to ensure secure and controlled access to resources.
18.
In a secure environment, which authentication mechanism performs better?
Correct Answer
B. TACACS because it encrypts client-server negotiation dialogs
Explanation
TACACS performs better in a secure environment because it encrypts client-server negotiation dialogs. This means that the communication between the client and server is protected and cannot be easily intercepted or accessed by unauthorized individuals. This encryption adds an extra layer of security to the authentication process, making it more robust and reliable in maintaining the confidentiality and integrity of the authentication data.
19.
Recently, your company has implemented a work from home program. Employees should connect securely from home to the corporate network. Which encryption technology can be used to achieve this goal?
Correct Answer
D. IPSec
Explanation
IPSec (Internet Protocol Security) is the correct answer because it is a widely used encryption technology that provides secure communication over the internet. It can be used to establish a secure connection between the employee's home network and the corporate network, ensuring that data transmitted between the two is encrypted and protected from unauthorized access. IPSec can be implemented through VPN (Virtual Private Network) protocols to create a secure tunnel for remote access, making it an ideal choice for employees connecting securely from home to the corporate network.
20.
Which of the following could cause communication errors with an IPSec VPN tunnel because of changes made to the IP header?
Correct Answer
C. NAT
Explanation
NAT (Network Address Translation) could cause communication errors with an IPSec VPN tunnel because it modifies the IP header by replacing the private IP address with a public IP address. This alteration can disrupt the IPSec VPN tunnel, as the original IP header information is changed and may not be recognized by the receiving end of the tunnel. DNS, SOCKS, and private addressing do not directly affect the IP header and therefore would not cause communication errors with an IPSec VPN tunnel due to changes made to the IP header.
21.
From the list of protocols, which two are VPN (Virtual Private Network) tunneling protocols? (Select two)
Correct Answer(s)
C. L2TP (Layer Two Tunneling Protocol)
E. PPTP (Point-to-Point Tunneling Protocol)
Explanation
L2TP (Layer Two Tunneling Protocol) and PPTP (Point-to-Point Tunneling Protocol) are both VPN tunneling protocols. L2TP is a protocol that allows the creation of virtual private networks over the internet, providing secure communication between remote networks or users. PPTP is another protocol that enables the creation of VPN tunnels, allowing secure and encrypted communication between remote clients and a private network. Both protocols are commonly used in VPN implementations to ensure the confidentiality and integrity of data transmitted over the network.
22.
Which of the following definitions should BEST suit the functions of an email server?
Correct Answer
C. Forms a platform on which messages are sent
Explanation
An email server is a computer program or software that forms a platform on which messages are sent. It acts as a central hub for sending, receiving, and storing email messages. It manages the transmission of messages between different email clients and ensures that messages are delivered to the intended recipients. The email server also provides features like authentication, encryption, and spam filtering to enhance the security and reliability of email communication.
23.
An SMTP server is the source of email spam in an organization. Which of the following is MOST likely the cause
Correct Answer
C. Anonymous relays have not been disabled
Explanation
Anonymous relays allow anyone to send emails through the SMTP server without authentication. This can be exploited by spammers to send spam emails. Therefore, if anonymous relays have not been disabled, it is most likely the cause of the email spam in the organization.
24.
The employees at a company are using instant messaging on company networked computers. The MOST important security issue to address when using instant messaging is that instant messaging:
Correct Answer
B. Communications are open and unprotected
Explanation
The most important security issue to address when using instant messaging is that communications are open and unprotected. This means that the messages being sent can be intercepted and read by unauthorized individuals, posing a risk to the confidentiality of sensitive information. It is crucial to implement encryption measures to ensure that the messages are securely transmitted and only accessible to the intended recipients.
25.
Which of the following would be the MOST common method of attackers to spoof email:
Correct Answer
D. Open relays
Explanation
Open relays are the most common method for attackers to spoof email. Open relays are mail servers that allow anyone to send emails through them, without requiring any authentication or verification. Attackers can exploit these open relays to send emails that appear to come from a different source, making it difficult to trace the origin of the email or identify the attacker. This method is often used for phishing attacks, spamming, and spreading malware.
26.
Which of the following attacks are being referred to if someone is accessing your email server and sending inflammatory information to others?
Correct Answer
B. Repudiation Attack
Explanation
A repudiation attack refers to the unauthorized access of an email server by an individual who then uses it to send inflammatory information to others. This attack allows the attacker to deny their involvement or claim that they did not send the malicious emails. It is a form of cyber attack that aims to manipulate or deceive recipients by sending false or harmful information from someone else's account, causing reputational damage or spreading false information. This attack can be detrimental to both individuals and organizations, as it can lead to legal consequences and damage relationships.
27.
Users on a network report that they are receiving unsolicited emails from the same email address. Which action should be performed to prevent this from occurring?
Correct Answer
C. Install an anti-spam filter on the domain mail servers and filter the email address
Explanation
To prevent users from receiving unsolicited emails from the same email address, the best action to take is to install an anti-spam filter on the domain mail servers and filter the email address. This will allow the mail servers to identify and block spam emails coming from the specific email address, effectively preventing them from reaching the users' inboxes. This solution targets the root of the problem by filtering the emails at the server level, ensuring that all users on the network are protected from receiving these unsolicited emails.
28.
Which of the following is the MOST significant flaw in Pretty Good Privacy (PGP) authentication?
Correct Answer
A. A user must trust the public key that is received
Explanation
The most significant flaw in Pretty Good Privacy (PGP) authentication is that a user must trust the public key that is received. This means that if an attacker is able to intercept and replace the public key, the user would unknowingly be encrypting their messages with the attacker's key instead of the intended recipient's key. This flaw compromises the security and confidentiality of the communication, as the attacker can decrypt and read the intercepted messages.
29.
To aid in preventing the execution of malicious code in email clients, which of the following should be done by the email administrator?
Correct Answer
D. Email client features should be disabled
Explanation
To prevent the execution of malicious code in email clients, the email administrator should disable email client features. This is because certain features in email clients, such as automatic execution of scripts or opening attachments without user confirmation, can be exploited by malicious code. By disabling these features, the risk of executing malicious code is significantly reduced.
30.
Choose the primary disadvantage of using a third party mail relay:
Correct Answer
B. Spammers can utilize the third party mail relay
Explanation
Using a third party mail relay can be disadvantageous because spammers can take advantage of it. This means that spammers can use the third party mail relay to send unsolicited and unwanted emails to a large number of recipients, which can lead to an increase in spam emails that users receive. This can be frustrating for users and can also cause issues such as clogging up email servers and potentially compromising the security of the system.
31.
Choose the option that details one of the primary benefits of using S/MIME/Secure Multipurpose Internet Mail Extension?
Correct Answer
B. S/MIME allows users to send both encrypted an digitally signed email messages
Explanation
S/MIME allows users to send both encrypted and digitally signed email messages, which ensures the security and authenticity of the email communication. Encrypting email messages protects the content from unauthorized access, while digital signatures verify the identity of the sender and ensure the integrity of the message. This provides confidentiality, privacy, and trust in email communication, making it one of the primary benefits of using S/MIME.
32.
A network administrator advises the server administrator of his company to implement whitelisting, blacklisting, closing open relays and strong authentication techniques. What threat is being addressed?
Correct Answer
B. Spam
Explanation
The network administrator's advice to implement whitelisting, blacklisting, closing open relays, and strong authentication techniques indicates that the threat being addressed is spam. These measures are commonly used to prevent unwanted and unsolicited emails from reaching the company's servers and networks. Whitelisting allows only approved senders to deliver emails, blacklisting blocks known spam sources, closing open relays prevents unauthorized use of the server to send spam, and strong authentication ensures that only legitimate users can access the email system.
33.
Which of the following types of publicly accessible servers should have anonymous logins disabled to prevent an attacker from transferring malicious data?
Correct Answer
D. FTP
Explanation
FTP (File Transfer Protocol) is a type of publicly accessible server that allows users to transfer files between computers. Disabling anonymous logins on an FTP server is important to prevent attackers from accessing the server without authentication and potentially transferring malicious data. By disabling anonymous logins, only authorized users with valid credentials can access the FTP server, reducing the risk of unauthorized access and data breaches.
34.
A peer-to-peer computer network uses diverse connectivity between participants in a network and the cumulative bandwidth of network participants rather than conventional centralized resources where a relatively low number of servers provide the core value to a service or application. Which of the following is a security risk while using peer-to-peer software?
Correct Answer
A. Data leakage
Explanation
Peer-to-peer software allows for direct communication and file sharing between participants in a network, without the need for centralized servers. This decentralized nature can increase the risk of data leakage, as there may not be strict control over who has access to the shared data. Additionally, participants in the network may have varying levels of security measures in place, making it easier for unauthorized individuals to access and leak sensitive information.
35.
Which of the following statements are true regarding File Sharing?
Correct Answer
D. When files are stored on a workstation, the connection is referred to as a peer-to-peer connection
Explanation
The statement "When files are stored on a workstation, the connection is referred to as a peer-to-peer connection" is true. In a peer-to-peer connection, files are stored on individual workstations and can be directly shared between those workstations without the need for a central server. This is different from client-server connections where files are stored on a server and accessed by clients.
36.
Which of the following ports are typically used by email clients (Select TWO)
Correct Answer(s)
A. 110
B. 143
Explanation
Ports 110 and 143 are typically used by email clients. Port 110 is used for the Post Office Protocol version 3 (POP3), which is a protocol used to retrieve email from a mail server. Port 143 is used for the Internet Message Access Protocol (IMAP), which is a protocol used to access and manage email on a remote mail server.
37.
Which of the following identifies the layer of the OSI model where SSL provides encryption?
Correct Answer
C. Session
Explanation
SSL (Secure Sockets Layer) provides encryption at the session layer of the OSI model. This layer is responsible for establishing, managing, and terminating connections between applications. SSL ensures secure communication by encrypting the data exchanged between the client and the server. It establishes a secure session and provides authentication, confidentiality, and integrity of the data transmitted.
38.
Which practice can best code applications in a secure manner?
Correct Answer
D. Input validation
Explanation
Input validation is the practice that can best code applications in a secure manner. Input validation involves checking and filtering user input to ensure that it meets the expected criteria and does not contain any malicious or unexpected data. By validating input, developers can prevent common security vulnerabilities such as SQL injection and cross-site scripting attacks. This helps to ensure that the application only processes valid and safe data, reducing the risk of security breaches and protecting user information.
39.
Which of the following definitions BEST suit Java Applet?
Correct Answer
A. The client browser must have the ability to run Java applets in a virtual machine on the client
Explanation
Java Applet is a program that runs within a web browser and requires the client browser to have the capability to run Java applets in a virtual machine on the client. This definition accurately describes the nature of Java Applet, as it is a client-side technology that relies on the browser's ability to execute Java code. The other definitions do not specifically address the requirement of running Java applets in a virtual machine, making them less suitable as definitions for Java Applet.
40.
Which of the following is a common type of attack on web servers?
Correct Answer
C. Buffer overflow
Explanation
Buffer overflow is a common type of attack on web servers where a program or process tries to store more data in a buffer than it can handle. This can lead to the overflow of data into adjacent memory locations, potentially allowing an attacker to execute malicious code or gain unauthorized access to the system.
41.
The concept that a web script is run in its own environment and cannot interfere with any other process is known as a :
Correct Answer
A. Sandbox
Explanation
The concept that a web script is run in its own environment and cannot interfere with any other process is known as a sandbox. A sandbox is a security mechanism that isolates running programs, preventing them from accessing resources or data outside of their designated area. This ensures that any malicious or faulty code executed within the sandbox does not affect the rest of the system. Sandboxing is commonly used in web browsers and operating systems to enhance security and protect against potential threats.
42.
Which of the following would be an easy way to determine whether a secure webpage has a valid certificate?
Correct Answer
C. Right click on the lock at the bottom of the browser and check the certificate information
Explanation
Right-clicking on the lock at the bottom of the browser and checking the certificate information would be an easy way to determine whether a secure webpage has a valid certificate. This action allows the user to view the details of the certificate, such as the issuer, expiration date, and any warnings or errors associated with it. By examining this information, the user can verify the authenticity and validity of the certificate, ensuring that the webpage is secure.
43.
A PC is rejecting push updates from the server; all other PCs on the network are accepting the updates successfully. What should be examined first?
Correct Answer
C. Local firewall
Explanation
The local firewall should be examined first because it is responsible for controlling the network traffic on the PC. If the local firewall is blocking the push updates from the server, it could be the reason why the PC is rejecting them while other PCs on the network are accepting them successfully. By checking the local firewall settings and ensuring that it is not blocking the updates, the issue can potentially be resolved.
44.
Which of the following uses private key/public key technology to secure web sites?
Correct Answer
A. SSL
Explanation
SSL (Secure Sockets Layer) uses private key/public key technology to secure web sites. It encrypts the data transmitted between a web server and a client, ensuring that it cannot be intercepted or tampered with by unauthorized parties. The private key is used to encrypt the data, and the public key is used to decrypt it. This ensures that only the intended recipient can access the encrypted data. SSL is widely used to provide secure communication over the internet, particularly for e-commerce websites and other sites that handle sensitive information.
45.
To reduce vulnerabilities on a web server, an administrator should adopt which of the following preventative measures?
Correct Answer
B. Apply the most recent manufacturer updates and patches to the server
Explanation
Applying the most recent manufacturer updates and patches to the server is a preventative measure to reduce vulnerabilities on a web server. Manufacturers regularly release updates and patches to fix security vulnerabilities and improve the server's overall performance. By keeping the server up to date with these updates, the administrator ensures that any known vulnerabilities are addressed and patched, reducing the risk of exploitation by attackers. This measure is essential for maintaining the security and integrity of the web server.
46.
Which of the following connectivity is required for a web server that is hosting an SSL based web site?
Correct Answer
D. Port 443 inbound
Explanation
A web server hosting an SSL based website requires inbound connectivity on port 443. Port 443 is the default port for HTTPS (HTTP over SSL/TLS) communication. Inbound connectivity on this port allows the server to receive incoming HTTPS requests from clients and establish secure connections. This is necessary for the server to serve the SSL based website and encrypt the data transmitted between the server and the clients.
47.
A technician is helping an organization to correct problems with staff members unknowingly downloading malicious code from Internet websites.Which of the following should the technician do to resolve the problem?
Correct Answer
D. Disable unauthorized ActiveX controls
Explanation
To resolve the problem of staff members unknowingly downloading malicious code from Internet websites, the technician should disable unauthorized ActiveX controls. ActiveX controls are a common target for malware and disabling unauthorized ones will prevent staff members from inadvertently downloading malicious code. This action will help protect the organization's network and systems from potential security threats.
48.
In computer programming, DLL injection is a technique used to run code within the address space of another process by forcing it to load a dynamic-link library. Which activity is MOST closely associated with DLL injection?
Correct Answer
C. SQL servers
Explanation
DLL injection is most closely associated with penetration testing. Penetration testing involves actively testing the security of a system by attempting to exploit vulnerabilities, such as DLL injection, to gain unauthorized access or perform malicious activities. SQL servers, vulnerability assessment, and network mapping are also important activities in computer programming and security, but they are not directly related to DLL injection.
49.
Which types of keys will be used if a server and workstation communicate via SSL (Select TWO)
Correct Answer(s)
B. Public key
D. Session key
Explanation
When a server and workstation communicate via SSL, they use public keys and session keys. Public key encryption is used to establish a secure connection between the server and the workstation. The server's public key is used to encrypt data that can only be decrypted using the server's private key. Session keys are then used for the actual encryption and decryption of data during the SSL session. These session keys are randomly generated for each session and are used to encrypt and decrypt the data exchanged between the server and the workstation.
50.
Which of the following programming techniques should be used to prevent buffer overflow attacks?
Correct Answer
D. Input validation
Explanation
Input validation is the correct answer because it involves checking and validating user input to ensure it meets the expected criteria and does not exceed the allocated buffer size. By implementing proper input validation techniques, such as length checks, data type checks, and sanitization, potential buffer overflow vulnerabilities can be mitigated. This helps to prevent attackers from injecting malicious code or overwriting adjacent memory locations, thus protecting the system from buffer overflow attacks.