What type of malicious activity involves carefully constructing a series of actions to interfere with the way memory is allocated in a system?

a. SYN flood
b. Session hijacking
c. Buffer overflow
d. Spoofing

Answer: c. Buffer overflow

Computer Science & Information Technology

You might also like to view...

________ data is automatically left-aligned by Excel

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What type of network might be used in a very small office where very basic file and print sharing must be used?

A) Peer-to-peer B) Client/server C) Private cloud D) Hybrid cloud

Computer Science & Information Technology