Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?

Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?
A . Memory leak
B . SQL injection
C . Resource exhaustion
D . Buffer overow

Answer: D

Latest SY0-501 Dumps Valid Version with 1130 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments