A systems administrator is reviewing the following information from a compromised server:
Given the above information, which of the following processes was MOST likely exploited via a remote buffer overflow attack?
A.
Apache
B.
LSASS
C.
MySQL
D.
TFTP
Explanation:
ExplanationExplanation/Reference: