Posted by: Pdfprep
Post Date: November 4, 2020
Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?
A . Memory leak
B . SQL injection
C . Resource exhaustion
D . Buffer overflow
Answer: D