List of questions
Related questions
Question 419 - 312-49v10 discussion
Buffer overflow vulnerability of a web application occurs when it fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the_________. There are multiple forms of buffer overflow, including a Heap
Buffer Overflow and a Format String Attack.
A.
Adjacent memory locations
B.
Adjacent bit blocks
C.
Adjacent buffer locations
D.
Adjacent string locations
Your answer:
0 comments
Sorted by
Leave a comment first