The buffer overflow type of attack has been known since it was first widely used by the __________ Worm in 1988.

A. Code Red B. Slammer

C. Morris Internet D. Alpha One

C. Morris Internet

Computer Science & Information Technology

You might also like to view...

The Column Layout feature of ________ reflows the document to fit the size of the device on which you are reading

Fill in the blank(s) with correct word

Computer Science & Information Technology

Clicking ________ returns a window to its previous size

Fill in the blank(s) with correct word

Computer Science & Information Technology