__________ can prevent buffer overflow attacks, typically of global data, which attempt to overwrite adjacent regions in the processes address space, such as the global offset table.
A. MMUs B. Guard pages
C. Heaps D. All the above
D. All the above
You might also like to view...
What is the biggest difference between a computer scientist and a digital forensic investigator?
a. The computer scientist has a college degree. Maybe the investigator has one and maybe she doesn't. b. The investigator needs to know a little about many aspects of how computers work, whereas the computer scientist will know a whole lot about a specialized area of computer science. c. A computer scientist has to know just about everything there is to know about computers. The investigator only needs to know how to dig the dirt out of a file system. d. An investigator is required to have either a private investigator's license or be employed by a law enforcement agency.
Which of the following is not part of the Software Life Cycle?
a. Analysis b. Design c. Data Entry d. Implementation e. Testing