Which of the following can be used to prevent a buffer overflow attack?

a. DEP
b. FIM
c. VPN
d. DNS

a. DEP

Computer Science & Information Technology

You might also like to view...

In 1984, Apple introduced its first computer with an API interface

Indicate whether the statement is true or false

Computer Science & Information Technology

To select a row, position the mouse pointer on the ____ edge of the row, then click.

A. top B. left C. right D. bottom

Computer Science & Information Technology