This topic contains a solution. Click here to go to the answer

Author Question: The __________ used a buffer overflow exploit in fingerd as one of its attack mechanisms. A. Code ... (Read 110 times)

segrsyd

  • Hero Member
  • *****
  • Posts: 530
The __________ used a buffer overflow exploit in fingerd as one of its attack mechanisms.
 
  A. Code Red Worm B. Sasser Worm
  C. Morris Internet Worm D. Slammer Worm

Question 2

__________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled.
 
  A. Compile-time defenses B. Shellcodes
  C. Run-time defenses D. All of the above



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

janieazgirl

  • Sr. Member
  • ****
  • Posts: 300
Answer to Question 1

C

Answer to Question 2

A





 

Did you know?

Vaccines prevent between 2.5 and 4 million deaths every year.

Did you know?

In 1835 it was discovered that a disease of silkworms known as muscardine could be transferred from one silkworm to another, and was caused by a fungus.

Did you know?

Women are 50% to 75% more likely than men to experience an adverse drug reaction.

Did you know?

Most women experience menopause in their 50s. However, in 1994, an Italian woman gave birth to a baby boy when she was 61 years old.

Did you know?

Today, nearly 8 out of 10 pregnant women living with HIV (about 1.1 million), receive antiretrovirals.

For a complete list of videos, visit our video library