PdfPrep.com

Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?

Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?
A . Memory leak
B . SQL injection
C . Resource exhaustion
D . Buffer overflow

Answer: D

Exit mobile version