25. Which of the followings best describes a buffer overflow vulnerability?
(A) Allowing unauthorized access to restricted files or directories
(B) Executing arbitrary code by injecting malicious SQL queries
(C) Overloading a server by sending a large volume of requests in a short time
(D) Writing data beyond the bounds of a fixed-size buffer, leading to memory corruption
(E) Intercepting and decrypting network traffic to steal sensitive information
詳解 (共 1 筆)
未解鎖
最能描述緩衝區溢出漏洞的選項是 **(D...