InterviewSolution
Saved Bookmarks
| 1. |
Malicious code can be pushed into the _________ during ______________ attack.(a) stack, buffer-overflow(b) queue, buffer-overflow(c) memory-card, buffer-overflow(d) external drive, buffer-overflowThe question was posed to me by my school teacher while I was bunking the class.The query is from Buffer Overflow topic in section Cyber Security of Cyber Security |
|
Answer» Right answer is (a) stack, buffer-overflow |
|