Malicious code can be pushed into the _________ during ______________ attack.
(a) stack, buffer-overflow
(b) queue, buffer-overflow
(c) memory-card, buffer-overflow
(d) external drive, buffer-overflow
The question was posed to me by my school teacher while I was bunking the class.
The query is from Buffer Overflow topic in section Cyber Security of Cyber Security