A buffer overflow in MicroSoft Windows 2000/XP Local Security Authority Subsystem Service was exploited by the _________ .

A. Aleph One B. Sasser worm

C. Slammer worm D. none of the above

B. Sasser worm

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a set of numbers and letters that have the same design and shape

Fill in the blank(s) with correct word

Computer Science & Information Technology

When using custom or advanced filters, the selected range can be formatted as a table or a database

Indicate whether the statement is true or false

Computer Science & Information Technology