Author Question: In 2003 the _________ exploited a buffer overflow in Microsoft SQL Server 2000. A. Slammer worm ... (Read 61 times)

123654777

  • Hero Member
  • *****
  • Posts: 585
In 2003 the _________ exploited a buffer overflow in Microsoft SQL Server 2000.
 
  A. Slammer worm B. Morris Internet Worm
  C. Sasser worm D. Code Red worm

Question 2

__________ can prevent buffer overflow attacks, typically of global data, which attempt to overwrite adjacent regions in the processes address space, such as the global offset table.
 
  A. MMUs B. Guard pages
 
   C. Heaps D. All of the above



raenoj

  • Sr. Member
  • ****
  • Posts: 340
Answer to Question 1

A

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The human body's pharmacokinetics are quite varied. Our hair holds onto drugs longer than our urine, blood, or saliva. For example, alcohol can be detected in the hair for up to 90 days after it was consumed. The same is true for marijuana, cocaine, ecstasy, heroin, methamphetamine, and nicotine.

Did you know?

There are 20 feet of blood vessels in each square inch of human skin.

Did you know?

The term pharmacology is derived from the Greek words pharmakon("claim, medicine, poison, or remedy") and logos ("study").

Did you know?

There are major differences in the metabolism of morphine and the illegal drug heroin. Morphine mostly produces its CNS effects through m-receptors, and at k- and d-receptors. Heroin has a slight affinity for opiate receptors. Most of its actions are due to metabolism to active metabolites (6-acetylmorphine, morphine, and morphine-6-glucuronide).

Did you know?

The most common childhood diseases include croup, chickenpox, ear infections, flu, pneumonia, ringworm, respiratory syncytial virus, scabies, head lice, and asthma.

For a complete list of videos, visit our video library