Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
When exploiting a buffer overflow vulnerability, what must the attacker specify in order to execute a malicious code?
The permissions for malicious program
The username
The return address
The administrator password
The correct response is the return address. This is the address that points to the command to be executed after buffer is overflown.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.