_____________ buffer overflows, which are more common among attackers.
(a) Memory-based
(b) Queue-based
(c) Stack-based
(d) Heap-based
The question was posed to me in an internship interview.
I want to ask this question from Buffer Overflow in division Cyber Security of Cyber Security