List of questions
Related questions
Question 138 - H12-711 discussion
Which of the following options is correct for the description of a buffer overflow attack?(multiple choice)
A.
Buffer overflow attacks exploit the flaws of software systems in memory operations to run attack code with high operating privileges.
B.
Buffer overflow attacks have nothing to do with the vulnerabilities and architecture of the operating system.
C.
Buffer overflow attacks are one of the most common ways to attack the behavior of software systems
D.
Buffer overflow attacks are application-layer attacks.
Your answer:
0 comments
Sorted by
Leave a comment first