In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code?
Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security mechanisms?