1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
3 years ago
14

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at

tacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions
Computers and Technology
1 answer:
Anni [7]3 years ago
6 0

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

You might be interested in
It is used to show the program and files that are open.
Ilia_Sergeevich [38]
A
Indeed that’s what it is
5 0
3 years ago
How to build an arch bridge​
Shkiper50 [21]

get resources like nails and wood and a couple rolls of tape if anything goes wrong

3 0
4 years ago
For a typical program, the input is taken using _________ Command-line scanf Files All of the mentioned
vfiekz [6]

Answer:

D)All of above

Explanation:

This is the complete question

For a typical program, the input is taken using _________.

A)Files

B)Command-line

C)scanf

D)All of above

E)None of these

computer program could be regarded as a collection of instructions which can be executed using computer to carry out a specific task, and it is written by programmer ,Input in domain of computer could be explained as feeding some data into a program. This input could be in the form of a file as well as command line, with the help of programming set of built-in functions that will help in reading the given input as well as feeding it to the program base on requirement. The scanf do reads the input from the standard input stream( stdin and scans) which is been input based on provided format. It should be noted that For a typical program, the input is taken using Files, Command-line and scanf.

7 0
3 years ago
When date is processed into a meaningful form, i becomes _______.
mrs_skeptik [129]

Answer:

When date is processed into a meaningful form, it becomes information.

6 0
3 years ago
Drag each label to the correct location on the image.
Anna [14]

Answer: uses a heat activated.... the answer is dry mount

Use triangular pockets to hold the corners....the answer is photo corners

Use different patterns of tape.....hinge mount

Uses wet glue to stick the print....wet mount

Explanation: I got this right on a post test

5 0
3 years ago
Other questions:
  • What happens when a Boolean expression is evaluated?
    7·1 answer
  • What can be used to describe and document the analysis and design of complex software systems?
    14·1 answer
  • You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination compute
    14·1 answer
  • The text discusses three different steps when processing input. Which of the following is (are) one of those steps? (Check all t
    8·1 answer
  • A data set has 60 observations with minimum value equal to 30 and a maximum value equal to 72. The estimated class width using t
    11·1 answer
  • When setting up a file system that is intended to be shared among several users, it is good practice to configure permissions so
    5·1 answer
  • Which features of words are used to separate numbers and texts into columns
    11·1 answer
  • Which two tasks are associated with router hardening? (choose two.)?
    6·1 answer
  • 1.   Microsoft Office is ?​
    10·1 answer
  • What is containment and why is it part of the planning process
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!