Malicious code can be pushed into the _________ during ______________ attack.
(a) stack, buffer-overflow
(b) queue, buffer-overflow
(c) memory-card, buffer-overflow
(d) external drive, buffer-overflow
The question was posed to me by my school teacher while I was bunking the class.
The query is from Buffer Overflow topic in section Cyber Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,