A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?
Q. A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?
A. Clickjacking
B. Buffer-overflow
C. Phishing
D. MiTM
Answer: Buffer-overflow