What exploit is used to elevate an attacker's permissions by inserting executable code in the computer's memory?

a. Trojan program
b. Buffer overflow
c. Ping of Death
d. Buffer variance


Answer: b. Buffer overflow

Computer Science & Information Technology

You might also like to view...

Overriding a base member function by using an overloaded derived member function is an example of ____.

A. polymorphism B. encapsulation C. inheritance D. information hiding

Computer Science & Information Technology

Inside the parentheses of a catch block are the ____ of the exception that’s thrown and a parameter name used to receive the exception.

a. return value b. try type c. data type d. catch type

Computer Science & Information Technology

A sub procedure triggered by an event is often called an event handler.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The _____, named after a nineteenth-century economist, is a widely used tool for visualizing issues that need attention and is drawn as a vertical bar graph.

A. Pareto chart B. Gantt chart C. Scatter chart D. XY chart

Computer Science & Information Technology