What type of malicious activity involves carefully constructing a series of actions to interfere with the way memory is allocated in a system?
a. SYN flood
b. Session hijacking
c. Buffer overflow
d. Spoofing
Answer: c. Buffer overflow
Computer Science & Information Technology
You might also like to view...
________ data is automatically left-aligned by Excel
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
What type of network might be used in a very small office where very basic file and print sharing must be used?
A) Peer-to-peer B) Client/server C) Private cloud D) Hybrid cloud
Computer Science & Information Technology