Attackers use buffer overflows to __________.
a. point to another area in data memory that contains the attacker’s malware code
b. corrupt the kernel so the computer cannot reboot
c. place a virus into the kernel
d. erase buffer overflow signature files
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here