A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?

Q. A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?

A.            Clickjacking

B.            Buffer-overflow

C.            Phishing

D.            MiTM

Answer: Buffer-overflow

We will be happy to hear your thoughts

Leave a reply

Gkseries.com
Logo
Register New Account