mrjanson9726 mrjanson9726
  • 15-07-2020
  • Computers and Technology
contestada

Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?
a) Memory leak
b) SQL injection
c) Resource exhaustion
d) Buffer overflow

Respuesta :

tonb
tonb tonb
  • 15-07-2020

Answer:

d) buffer overflow

Explanation:

When buffer overflow happens, data gets overwritten by caller data that is not supposed to be overwritten.

If the caller data is carefully crafter instruction code, this would be a way to execute malicious code.

Answer Link

Otras preguntas

Which of the following is true of the recovery pattern of grief explained by George Bonanno? Group of answer choices In this pattern, individuals experience pro
This type of business is managed by a board of directors, required more money, and start up time, and shares in the company can be sold.___________
Write a paragraph (minimum 5 sentences) explaining why political borders sometimes cause conflict between people. Give examples of why people may not agree wit
A wide areanetwork is a very personal network to a user. a. true b. false
Report on determination of ratio of Na2CO3 and NaHCO3 in mixture
Find two examples of formal fallacy and two examples of informal fallacy.
My mom colourful head scarf meaningful
1. a line containing point P 2. A line through point U 3. a plane containing Q, S, and R 4. another name for line n 5. a point in the exterior of the plane
Summer rain Winter rain Rein throughout the year Arid rejons Very dry Benguela current (cold) Orange Boemfontein. Caledon Cape Towns East London Port Elizabeth
Descomposicion en factores primos del numero 128