1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastaziya [24]
4 years ago
13

Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?

Computers and Technology
1 answer:
fredd [130]4 years ago
6 0

Answer:

d) buffer overflow

Explanation:

When buffer overflow happens, data gets overwritten by caller data that is not supposed to be overwritten.

If the caller data is carefully crafter instruction code, this would be a way to execute malicious code.

You might be interested in
Write 4 types of network_based<br>on geographical area covered<br>by them​
ikadub [295]

Answer:

Network based coverages are LAN, WAN, MAN and WLAN

4 0
3 years ago
Select the pieces of information that are added on to data to get it where it is going.
oksian1 [2.3K]

Answer:

IP address and MAC address

Explanation: The IP address tells the server what network to send the information to, the MAC address tells the local network what device to send it to.

5 0
3 years ago
A computer application such as Microsoft Access that is used to store data and convert it into information is a ________________
lorasvet [3.4K]
All data is stored in table
5 0
4 years ago
What does C.L.O stands for?
Ray Of Light [21]

It stands for 'collateralized loan obligation'

Meaning,
A collateralized loan obligation (CLO) is a security backed by a pool of debt, often low-rated corporate loans.

4 0
3 years ago
Read 2 more answers
Where would you go to access frequently used icons?
trapecia [35]

Answer:

b

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Using C++, Write a full class definition for a class named Acc1, containing no constructors, functions, or data members (i.e., a
    12·2 answers
  • Lynn runs the locate command and the results include many files from a directory that she doesn't want to include in her search.
    9·1 answer
  • In which of the following work situations would word processing software be most appropriate to make the task easier?
    6·1 answer
  • Which of the following happens when you enter the formula =G15 into a cell?
    12·1 answer
  • Explain the history of computing device of mechanical era
    7·1 answer
  • What types of standards are developed by the Electronics Industries Alliance (EIA)?
    14·2 answers
  • nder a Huffman encoding ofnsymbols with frequenciesf1, f2, . . . , fn, what is the longest a codewordcould possibly be
    13·1 answer
  • Find the quotient. 2.5 ÷ 5
    8·2 answers
  • Do you want my hero academia?<br><br><br><br><br><br> if so, who's your favorite character :&gt;
    5·2 answers
  • What component of a change management program includes final testing that the software functions properly
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!