1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
3 years ago
5

The attacker sent data that was able to manipulate the return address that is reserved to store expected data

Computers and Technology
1 answer:
KatRina [158]3 years ago
3 0

Complete Question:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?

Answer:

A buffer overflow.

Explanation:

In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).

In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.

You might be interested in
A ____________ is a set of commands which can be run by calling it by name
poizon [28]
Window as technology I believe so
5 0
4 years ago
What 3 types of data can be entered in a spreadsheet
NNADVOKAT [17]

Answer:

data, labels and formulas

6 0
3 years ago
HELP ME PLEASE I WILL MARK YOU as brainliest please help me
nekit [7.7K]

the answer bichhhhhhhhhhhhhhhhhhhhhhhh

6 0
3 years ago
The default ____ for a hyperlink is the folder location and the name of the file to which you will link.
ycow [4]
Title is used
hope it helps
6 0
4 years ago
There are two cons to an OLTP database. Which of the following are a solution of these cons?​
Delicious77 [7]

Answer:

The answer is below

Explanation:

An OLTP (Online transaction processing) database is a database that allows for quick transaction processing. It involves inserting, deleting, updating data in the database.

OLTP has many drawbacks like if the system fails, all transactions are going to have problems. Also, since multiple users are allowed to access the data, it makes it prone to hackers.

The solution to the problems associated to the OLTP database is the OLAP (online analytical processing) database.

The OLAP systems allow users to analyze database information from multiple database systems at one time thereby allowing analysis for business decisions.

6 0
4 years ago
Other questions:
  • Elizabeth works for a local restaurant At the end of her shift, she is required
    15·2 answers
  • Which telecommunications offering is a component of social media? A.)web conferencing
    13·2 answers
  • Which of the following common software packages would help a business
    6·1 answer
  • What do you mean by radix of a number system​
    14·1 answer
  • Assume that you have 22 slices of pizza and 7 friends that are going to share it (you've already eaten). There's been some argum
    9·1 answer
  • You created a two-dimensional array with the following code.
    14·2 answers
  • What do you consider to be audit evaluation areas?
    14·1 answer
  • Write a Python program (rainfall.py) to collect data and calculate the average rainfall over a period of years. The program shou
    11·1 answer
  • How does naming affect a variable’s creation and use?
    6·1 answer
  • 30 POINTS FOR THE ANSWER
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!