Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?
Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?
A . Memory leak
B . SQL injection
C . Resource exhaustion
D . Buffer overow
Answer: D
Latest SY0-501 Dumps Valid Version with 1130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments