In 2003 the _________ exploited a buffer overflow in Microsoft SQL Server 2000.

A. Slammer worm B. Morris Internet Worm

C. Sasser worm D. Code Red worm

A. Slammer worm

Computer Science & Information Technology

You might also like to view...

During a particularly extensive review of the email archives for a large organization you perform several complex searches. You want to get a good idea of how efficient your searches are. What are two variables that can be used to calculate a percentage of accuracy?

a. Accuity b. Precision c. Recall d. Granularity

Computer Science & Information Technology

What technique does the function use to refer to array elements?

Consider the following function: void reverse(char *string1, const char *string2) { int stringsize{sizeof(string1)/sizeof(char)}; *(string1 + stringsize – 1) = '\0'; string1 = string1 + stringsize – 2; for (; *string2 != '\0'; string1--, string2++) { *string1 = *string2; } }

Computer Science & Information Technology