A buffer overflow in MicroSoft Windows 2000/XP Local Security Authority Subsystem Service was exploited by the _________ .
A. Aleph One B. Sasser worm
C. Slammer worm D. none of the above
B. Sasser worm
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a set of numbers and letters that have the same design and shape
Fill in the blank(s) with correct word
Computer Science & Information Technology
When using custom or advanced filters, the selected range can be formatted as a table or a database
Indicate whether the statement is true or false
Computer Science & Information Technology