mrjanson9726 mrjanson9726
  • 15-07-2020
  • Computers and Technology
contestada

Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?
a) Memory leak
b) SQL injection
c) Resource exhaustion
d) Buffer overflow

Respuesta :

tonb
tonb tonb
  • 15-07-2020

Answer:

d) buffer overflow

Explanation:

When buffer overflow happens, data gets overwritten by caller data that is not supposed to be overwritten.

If the caller data is carefully crafter instruction code, this would be a way to execute malicious code.

Answer Link

Otras preguntas

Help pls!! Why is james douglas significant to the development of British Columbia?
I dont know the answer to this question I dont know what I can put for the x and the y
explain why Shakespeare and his stories (particularly Romeo and Juliet) are timeless, classic, and still relevant in modern society.
HELP ME PLEASE...!!!
Classify the following triangle. *Check all that apply* A. Right B. Acute C. Scalene D. Isosceles E. Obtuse F. Equilateral
Help me this is due rn
Harlan undergoes a mediastinotomy. In what section of the CPT manual would the code for this procedure be located? What additional information would be needed t
find the total surface area of the cube
Please select the word from the list that best fits the definition Luis no puede escuchar. bassically say the definition in english
PLEASE HELP WILL MARK BRAINLIEST!!!!