ECCouncil Computer Hacking Forensic Investigator 312-49 Question # 101 Topic 11 Discussion

ECCouncil Computer Hacking Forensic Investigator 312-49 Question # 101 Topic 11 Discussion

312-49 Exam Topic 11 Question 101 Discussion:
Question #: 101
Topic #: 11

Buffer overflow vulnerability of a web application occurs when it fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the_________. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.


A.

Adjacent memory locations


B.

Adjacent bit blocks


C.

Adjacent buffer locations


D.

Adjacent string locations


Get Premium 312-49 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.