The function of ________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program.

A. shellcode B. stacking

C. no-execute D. memory management


A. shellcode

Computer Science & Information Technology

You might also like to view...

Given the number of possible participants in the operations and maintenance process, the logical way to establish a formal security of operations function is through an organization-wide ____ activity.

A. enterprise continuity B. data security C. digital forensics D. strategic planning

Computer Science & Information Technology

What IEEE standard includes steps that assure that lifecycle models contain necessary levels of detail?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

PowerPoint displays a(n) ____________________ between slides to indicate the proposed slide position before you release the mouse button.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An uncaught exception in a function causes that function to be _________ from the function call stack.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology