Traditionally the function of __________ was to transfer control to a user command-line interpreter, which gave access to any program available on the system with the privileges of the attacked program. A. sh

A. shellcode B. C coding

C. assembly language D. all the above

A. shellcode

Computer Science & Information Technology

You might also like to view...

Which of the following command-line utilities is capable of making a forensic image of a hard disk, assuming that a valid form of write-protection is in place?

a. COPY b. XCOPY c. MOVE d. DD

Computer Science & Information Technology

Regular expressions are used in:

a. text editors b. online forms c. IDEs d. all of the above

Computer Science & Information Technology