mrjanson9726 mrjanson9726
  • 15-07-2020
  • Computers and Technology
contestada

Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?
a) Memory leak
b) SQL injection
c) Resource exhaustion
d) Buffer overflow

Respuesta :

tonb
tonb tonb
  • 15-07-2020

Answer:

d) buffer overflow

Explanation:

When buffer overflow happens, data gets overwritten by caller data that is not supposed to be overwritten.

If the caller data is carefully crafter instruction code, this would be a way to execute malicious code.

Answer Link

Otras preguntas

APA style is typically used by writers and students creating writing projects in which of the following areas?        A. Social sciences   B. Language arts
which has more kinetic energy, a feather floating through the air or a rock on the ground? Explain.
Why is the water vapor fresh water when it rises from the ocean?
9x 2 and 5x are like terms. true or false
Who invented the tuba?
Which country produced the most industrial goods in the early twentieth century? A. United States. . B. Germany. . C. England. . D. Jap
Which of the following causes the most problems in countries with low economic growth? A) poor education B) low unemployment C) rapid population increase
What was the immediate result of trench warfare?. a.an easy victory for the Allied Powers c.fewer casualties on both sides. b.massive deadlock d.an easy vic
When a figure is rotated, it's angle measures 1. remain the same 2. May change , and it's orientation 1. Remain the same 2. May change
Steve's doctor has advised him to take protein supplements. He bought two brands, Brand A and Brand B. The table gives the amount of calcium, iron, and vitamins