Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?
A . Memory leak
B . SQL injection
C . Resource exhaustion
D . Buffer overflow
Answer: D
Latest SY0-501 Dumps Valid Version with 1130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund