1.

Malicious code can be pushed into the _________ during ______________ attack.(a) stack, buffer-overflow(b) queue, buffer-overflow(c) memory-card, buffer-overflow(d) external drive, buffer-overflowThe question was posed to me by my school teacher while I was bunking the class.The query is from Buffer Overflow topic in section Cyber Security of Cyber Security

Answer»

Right answer is (a) stack, buffer-overflow

The BEST EXPLANATION: Malicious CODE can be pushed into the stack during the buffer-overflow ATTACK. The overflow can be used to OVERWRITE the return pointer so that the control-flow switches to the malicious code.



Discussion

No Comment Found

Related InterviewSolutions