Multiple Choice
A buffer overflow can best be described as
A) A hacker who makes a website that has more content than the browser can handle
B) A hacker who sends more data than is expected in an attempt to overwrite legitimate memory
C) A hacker who uses an e-mail virus to format the hard drive with junk code
D) A hacker who sends repeated requests for information from a server in an attempt to crash the server
Correct Answer:

Verified
Correct Answer:
Verified
Q35: _ are pieces of code that can
Q36: Which is a 100% secure method to
Q37: _ are small application programs that increase
Q38: Which of the following do not enhance
Q39: HTTPS uses TCP port 443.
Q40: Telnet is used to upload and download
Q41: Which of the following in a browser
Q43: FTP encrypts traffic by default.
Q44: _ is a general-purpose protocol developed by
Q45: _ is an application-level protocol that operates