Which of the following can be used to prevent a buffer overflow attack?
a. DEP
b. FIM
c. VPN
d. DNS
a. DEP
Computer Science & Information Technology
You might also like to view...
In 1984, Apple introduced its first computer with an API interface
Indicate whether the statement is true or false
Computer Science & Information Technology
To select a row, position the mouse pointer on the ____ edge of the row, then click.
A. top B. left C. right D. bottom
Computer Science & Information Technology