This topic contains a solution. Click here to go to the answer

Author Question: The __________ used a buffer overflow exploit in fingerd as one of its attack mechanisms. A. Code ... (Read 48 times)

segrsyd

  • Hero Member
  • *****
  • Posts: 530
The __________ used a buffer overflow exploit in fingerd as one of its attack mechanisms.
 
  A. Code Red Worm B. Sasser Worm
  C. Morris Internet Worm D. Slammer Worm

Question 2

__________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled.
 
  A. Compile-time defenses B. Shellcodes
  C. Run-time defenses D. All of the above



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

janieazgirl

  • Sr. Member
  • ****
  • Posts: 300
Answer to Question 1

C

Answer to Question 2

A





 

Did you know?

There are over 65,000 known species of protozoa. About 10,000 species are parasitic.

Did you know?

Fungal nail infections account for up to 30% of all skin infections. They affect 5% of the general population—mostly people over the age of 70.

Did you know?

The first oncogene was discovered in 1970 and was termed SRC (pronounced "SARK").

Did you know?

Intradermal injections are somewhat difficult to correctly administer because the skin layers are so thin that it is easy to accidentally punch through to the deeper subcutaneous layer.

Did you know?

Asthma cases in Americans are about 75% higher today than they were in 1980.

For a complete list of videos, visit our video library