An exploit that attacks computer systems by inserting executable code in areas of memory not protected because of poorly written code is called which of the following?

a. Buffer overflow
b. Trojan program
c. Virus
d. Worm

Answer: a. Buffer overflow

Computer Science & Information Technology

You might also like to view...

Queries may contain ________, which are values that limit the displayed records to those that match the specified conditions

Fill in the blank(s) with correct word

Computer Science & Information Technology

The process of data ____________________ is used to display each field as an object on the form.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology