What exploit is used to elevate an attacker's permissions by inserting executable code in the computer's memory?
a. Trojan program
b. Buffer overflow
c. Ping of Death
d. Buffer variance
Answer: b. Buffer overflow
You might also like to view...
Overriding a base member function by using an overloaded derived member function is an example of ____.
A. polymorphism B. encapsulation C. inheritance D. information hiding
Inside the parentheses of a catch block are the ____ of the exception that’s thrown and a parameter name used to receive the exception.
a. return value b. try type c. data type d. catch type
A sub procedure triggered by an event is often called an event handler.?
Answer the following statement true (T) or false (F)
The _____, named after a nineteenth-century economist, is a widely used tool for visualizing issues that need attention and is drawn as a vertical bar graph.
A. Pareto chart B. Gantt chart C. Scatter chart D. XY chart