1.

Malicious code can be pushed into the _________ during ______________ attack.

A. stack, buffer-overflow
B. queue, buffer-overflow
C. memory-card, buffer-overflow
D. external drive, buffer-overflow
Answer» B. queue, buffer-overflow


Discussion

No Comment Found