In a _____________ attack, the extra data that holds some specific instructions in the memory for actions is projected by a cyber-criminal or penetration tester to crack the system.
(a) Phishing
(b) MiTM
(c) Buffer-overflow
(d) Clickjacking
This question was posed to me in my homework.
This interesting question is from Buffer Overflow in division Cyber Security of Cyber Security