The function of ________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program.
A. shellcode B. stacking
C. no-execute D. memory management
A. shellcode
You might also like to view...
Given the number of possible participants in the operations and maintenance process, the logical way to establish a formal security of operations function is through an organization-wide ____ activity.
A. enterprise continuity B. data security C. digital forensics D. strategic planning
What IEEE standard includes steps that assure that lifecycle models contain necessary levels of detail?
Fill in the blank(s) with the appropriate word(s).
PowerPoint displays a(n) ____________________ between slides to indicate the proposed slide position before you release the mouse button.
Fill in the blank(s) with the appropriate word(s).
An uncaught exception in a function causes that function to be _________ from the function call stack.
Fill in the blank(s) with the appropriate word(s).