This topic contains a solution. Click here to go to the answer

Author Question: The __________ used a buffer overflow exploit in fingerd as one of its attack mechanisms. A. Code ... (Read 123 times)

segrsyd

  • Hero Member
  • *****
  • Posts: 530
The __________ used a buffer overflow exploit in fingerd as one of its attack mechanisms.
 
  A. Code Red Worm B. Sasser Worm
  C. Morris Internet Worm D. Slammer Worm

Question 2

__________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled.
 
  A. Compile-time defenses B. Shellcodes
  C. Run-time defenses D. All of the above



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

janieazgirl

  • Sr. Member
  • ****
  • Posts: 300
Answer to Question 1

C

Answer to Question 2

A





 

Did you know?

In 1885, the Lloyd Manufacturing Company of Albany, New York, promoted and sold "Cocaine Toothache Drops" at 15 cents per bottle! In 1914, the Harrison Narcotic Act brought the sale and distribution of this drug under federal control.

Did you know?

A headache when you wake up in the morning is indicative of sinusitis. Other symptoms of sinusitis can include fever, weakness, tiredness, a cough that may be more severe at night, and a runny nose or nasal congestion.

Did you know?

Green tea is able to stop the scent of garlic or onion from causing bad breath.

Did you know?

The B-complex vitamins and vitamin C are not stored in the body and must be replaced each day.

Did you know?

The first documented use of surgical anesthesia in the United States was in Connecticut in 1844.

For a complete list of videos, visit our video library