25. Which of the followings best describes a buffer overflow vulnerability?
(A) Allowing unauthorized access to restricted files or directories
(B) Executing arbitrary code by injecting malicious SQL queries
(C) Overloading a server by sending a large volume of requests in a short time
(D) Writing data beyond the bounds of a fixed-size buffer, leading to memory corruption
(E) Intercepting and decrypting network traffic to steal sensitive information
答案:登入後查看
統計: A(0), B(0), C(0), D(5), E(0) #3228183
統計: A(0), B(0), C(0), D(5), E(0) #3228183