which of the following processes was MOST likely exploi…

A systems administrator is reviewing the following information from a compromised server:

Given the above information, which of the following processes was MOST likely exploited via a remote buffer overflow attack?

A systems administrator is reviewing the following information from a compromised server:

Given the above information, which of the following processes was MOST likely exploited via a remote buffer overflow attack?

A.
Apache

B.
LSASS

C.
MySQL

D.
TFTP

Explanation:
ExplanationExplanation/Reference:



Leave a Reply 0

Your email address will not be published. Required fields are marked *