Which of the following tools can be used as a countermeasure to such an attack?
An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code.
The image given below explains this phenomenon:
Which of the following tools can be used as a countermeasure to such an attack?
A . SmashGuard
B . Obiwan
C . Kismet
D . Absinthe
Answer: A
Latest GPPA Dumps Valid Version with 285 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments