. In ___________ attack, malicious code is pushed into _______.
1.buffer-overflow, stack
2.buffer-overflow, queue
3.buffer-overflow,memory-card
4.buffer-overflow,external drive
with reason!!!!!!!
Answers
Answered by
7
Explanation:
1.buffer-overflow,stack
Answered by
7
Answer: Option 1 is correct answer
Explanation: Malicious code can be pushed into the stack during the buffer-overflow attack. The overflow can be used to overwrite the return pointer so that the control-flow switches to the malicious code.
Similar questions
History,
3 months ago
Math,
6 months ago
Social Sciences,
6 months ago
Social Sciences,
10 months ago