Computer Science, asked by tripathivaibhav733, 6 months ago

. In ___________ attack, malicious code is pushed into _______.

1.buffer-overflow, stack

2.buffer-overflow, queue

3.buffer-overflow,memory-card

4.buffer-overflow,external drive

with reason!!!!!!!​

Answers

Answered by maitrirana106
7

Explanation:

1.buffer-overflow,stack

Answered by majeedkhari2000
7

Answer: Option 1 is  correct answer

Explanation: Malicious code can be pushed into the stack during the buffer-overflow attack. The overflow can be used to overwrite the return pointer so that the control-flow switches to the malicious code.

Similar questions
Physics, 3 months ago