ExamGecko
Question list
Search
Search

Related questions











Question 138 - H12-711 discussion

Report
Export

Which of the following options is correct for the description of a buffer overflow attack?(multiple choice)

A.
Buffer overflow attacks exploit the flaws of software systems in memory operations to run attack code with high operating privileges.
Answers
A.
Buffer overflow attacks exploit the flaws of software systems in memory operations to run attack code with high operating privileges.
B.
Buffer overflow attacks have nothing to do with the vulnerabilities and architecture of the operating system.
Answers
B.
Buffer overflow attacks have nothing to do with the vulnerabilities and architecture of the operating system.
C.
Buffer overflow attacks are one of the most common ways to attack the behavior of software systems
Answers
C.
Buffer overflow attacks are one of the most common ways to attack the behavior of software systems
D.
Buffer overflow attacks are application-layer attacks.
Answers
D.
Buffer overflow attacks are application-layer attacks.
Suggested answer: A, C, D
asked 18/09/2024
Sanjiv Cumar
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first