An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions

Answers

Answer 1

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

https://brainly.com/question/4952591


Related Questions

Which information is required when designing a field? check all that apply.

Answers

Answer:

Explanation:

dimensions or calculation

(11011+1001) base 2
please slove this​

Answers

Answer:

Explanation:

We can convert both to base 10 first:

(1+2+8+16) + (1+8) = 36.

Converting back to base 2, we get

100100

Why should a user preview the document before printing?​

Answers

Answer:

Print preview is a useful function to users as it helps them to see how the final printed material will appear. It also gives the user the opportunity to check or adjust the layout or resolve any issues before printing the material to achieve the intended final form.

An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture curate and consumer customer information?

Answers

Answer:

Data and Insights

Explanation:

In an enterprise platform, the data and insights are considered as one of the important aspect of any enterprise. It helps in better understanding of the customer so that the enterprise successfully offers best services to the customers.

Data are basically the information that enterprise can gather from the customers and insights are defined by gaining knowledge by analyzing these data so that the company can provide best customer service and it also helps them to capture curate as well as consumer information.

Thus the answer is 'data and insights'.

Which of the following are true statements about the Java wrapper classes (Select all that apply.): Select one or more: a. Objects of these type are immutable b. Objects of these types are mutable c. The wrapper classes do not have no-arg constructors d. The wrapper classes do have no-arg constructors

Answers

Answer:

a. Objects of these type are immutable.

Explanation:

Java wrapper classes are used to convert data into objects. The primitive data is not object and it does not belong to any class. Therefore Java wrapper classes help the user to convert primitive data into object. These objects are immutable and they have no arg constructor.

Which three pieces of information must you include in a project goals document? (Choose 3)
A) Target audience
B) Project deadline
C) Project purpose
D) Color palette
E) Hero image

Answers

Answer:

A) Target audience

B) Project deadline

C) Project purpose

Explanation:

The project goals document outlines the scope of the project, detailing what the project entails to everyone that is to work on the project such that the objectives to focused on, the tasks to be completed, the timeline and deadline of the project, the project participants, and audiences are known or understood, thereby placing everyone in the project team on track

The three pieces of information that must be included in a project are therefore; the target audience of the document, the deadline of the project, clearly stated, and the purpose of the project; what the project is going to accomplish

The three pieces of information you must include in a project goals document are:

A) Target audience B) Project deadline C) Project purpose  

According to the given question, we are asked to show the  three pieces of information you must include in a project goals document and why they are important when making a project goal.

As a result of this, we can see when making a project goals document, it is important to include the target audience, project deadline and the project purpose because it gives the project a clear objective and deadline which can be achieved.

Read more here:

https://brainly.com/question/17293938

What is the diffrent between ibm pc and ibm compatibles in table:​

Answers

Answer:

An IBM PC is a computer designed and developed directly by IBM, where as IBM Compatibles are designed by IBM but manufactured by companies other then IBM.

Explanation:

Hope this helped :)

Short Questions: a) What is website? How can we browse internet using website?​

Answers

Answer:

A website is a set of related web page or pages located under a single domain name. These pages contain specific information which was all provided by one person or entity and traces back to a common Uniform Resource Locator or (URL).

Explanation:

There are millions of Websites around the world and contain information about everything.

Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?

Use the Insert tab and select the appropriate function from the Functions group.
Type an = sign in the cell, followed by the name of the function and the relevant arguments.
Right-click the cell to access the context menu to insert the function.
Use the View tab and choose the correct function from the displayed list.

Answers

Answer:

Type an = sign in the cell, followed by the name of the function and the relevant arguments.

Explanation:

Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents. There are different types of functions used in Microsoft Excel to perform specific tasks and these includes;

1. VLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized vertically. Thus, it's typically used for searching values in a column.

2. SUMIF function: it is an Excel function to sum cells that meet criteria such as text, dates and numbers. This function can be used with the following logical operators; <, >, and =.

3. COUNT function: it's an Excel function to find the total number of entries in a column. For example, to count the number of entries in B1:B15; COUNT(B2:B15).

4. IF function: runs a logical test and returns one value for a TRUE result, and another for a FALSE result. For example, to fail scores that are below 40; IF (A1 < 40, "Fail", "Pass").

5. HLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized horizontally. Thus, it's typically used for searching values in a column.

In Microsoft Excel, to insert the IF, COUNTIF, or SUM function into a cell, you should type an equal to (=) sign in the cell, followed by the name of the particular function and the relevant arguments.

For example, to use the SUMIF function, you should type; =SUMIF(A2:B5, "Peter", C1:C9).

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do

Answers

Answer:

Implement BitLocker with a TPM

Explanation:

In Computer science, a memory is a term used to describe the available space or an electronic device that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders. Some examples of a storage device are hard disk drive, CD-ROM, flash drive, etc.

Basically, there are two (2) main types of memory;

A. Read only memory (ROM).

B. Random access memory (RAM).

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

In this scenario, if you want to prevent the laptops from booting unless a special USB drive is inserted; you should implement BitLocker with a trusted platform module (TPM) on Microsoft Windows.

write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this

please hurry i need urgent

Answers

Answer:

Algorithm

1. Begin

2. num_bottles = 0

3. While num_bottles != 500

   3.1 Create bottle

   3.2 num_bottles = num_bottles + 1

4. Switch off machine

5. End

The flowchart has been added as an attachment

Explanation:

Begin algorithm

1. Begin

Initialize bottles to 0

2. num_bottles = 0

Repeat loop until 500 bottles is created

3. While num_bottles != 500

Create a new bottle

  3.1 Create bottle

Increment the number of bottles by 1

  3.2 num_bottles = num_bottles + 1

End Loop

Switch off the machine after loop ends

4. Switch off machine

End algorithm

5. End

Nama prinsip kerja mouse adalah

Answers

Answer:

Mampu bekerja di hampir semua permukaan, mouse memiliki light-emitting diode (LED) merah kecil yang memantulkan cahaya dari permukaan itu ke sensor semikonduktor oksida logam (CMOS) komplementer. Sensor CMOS mengirimkan setiap gambar ke prosesor sinyal digital (DSP) untuk dianalisis.

in english

Able to work on almost any surface, the mouse has a small, red light-emitting diode (LED) that bounces light off that surface onto a complementary metal-oxide semiconductor (CMOS) sensor. The CMOS sensor sends each image to a digital signal processor (DSP) for analysis.

c programming question


Given n, take the sum of the digits of n. If that value has more than one digit, continue reducing in this way until a single-digit number is produced. The input will be a non-negative integer.

Answers

Answer:

int digitSum(int n) {

int sum = 0;

while (n) {

 sum += n % 10;

 n /= 10;

}  

return sum < 10 ? sum : digitSum(sum);

}

int main()

{

int n = 12345;

printf("Digit sum of %d is %d\n", n, digitSum(n));

}

Explanation:

The recursion takes care of the repeated summing in case the sum has more than 1 digit.

What stage in the process of media production involves discussing the budget and timelines as well as identifying stakeholders? create/develop upload/display research/define plan/design

Answers

Answer:

research/define

It is C

The program prompts the user for five to ten numbers all on one line, separated by spaces, calculates the average of those numbers, and displays the numbers and their average to the user.

The program uses methods to:

1) get the numbers entered by the user all on one line separated by spaces;

2) calculate the average of the numbers entered by the user; and

3) print the results.

The first method should take no arguments and return a String of numbers separated by spaces.

The second method should take a String as its only argument and return a double (the average).

The third method should take a String and a double as arguments but have no return value.

IF user input is: 20 40 60 80 100

Answers

Answer:  

import java.util.Scanner;  

public class AverageDemo

{  

public static String getNumbers()

{

 

 String numbers;  

 Scanner scn = new Scanner(System.in);  

 System.out.println("Enter five to ten numbers all on one line, separated by spaces: ");

 numbers = scn.nextLine();

 return numbers;

}  

public static double calcAverage(String numbers)

{

 String[] values = numbers.split(" ");

 double total = 0;  

 for (int i = 0; i < values.length; i++)

 {

  total += Integer.parseInt(values[i]);

 }  

 if (values.length == 0)

  return 0.0;

 else

  return (total / values.length);

}  

// Method definition of printResults: print the results

public static void printResults(String numbers, double average)

{

 System.out.printf("\nThe average of the numbers %s is %.2f\n", numbers, average);

}  

// main method

public static void main(String[] args)

{

 // Call the methods

 String numbers = getNumbers();

 double average = calcAverage(numbers);

 printResults(numbers, average);

}

}

Output:

Who said the following, and what does it mean? Conceit, more rich in matter than in words, Brags of his substance, not of ornament. They are but beggars that can count their worth; But my true love is grown to such excess I cannot sum up half my sum of wealth. (II. vi. 33-37) Juliet; she is saying that she doesn't care about money. Lady Capulet; she is reminding Juliet how lucky she is to be marrying Paris. Romeo; he is saying that true understanding has made him realize how very lucky he is to be marrying Juliet. Juliet; she is saying that true understanding is enriched by reality and worth more than outward appearances.

Answers

Answer: Juliet; she is saying that true understanding is enriched by reality and worth more than outward appearances.

Explanation:

Juliet was talking to Romeo in this instance and trying to tell him that it was easy to speak words but that for those words to be properly understood, action must follow them.

In other words she was telling him that to truly understand something, actions must back it up. She then goes on to say to him that the love she has is so much that it has made her feel more wealthy.

To call a member function, you code a. the name of the object in parentheses, followed by the name of the function b. the name of the object, the dot operator, and the name of the function c. the name of the object, followed by the scope resolution operator and the name of the function d. the name of the object, followed by the name of the function in parentheses

Answers

Answer:

using a pointer to member function to call function

How can computer be beneficial in agriculture and tourism​

Answers

The production capacity in farming and animal husbandry has increase due to use of computer in agriculture field . There are less losses due to work are monitored by computer. By using computer in traditional field like agricultural field we can increase the productivity and minimize the error happen.

Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hires that need onboarding with user accounts. When Travis looks at all the existing account names, he notices there is no common naming system. Where should he look to try to give the new hires user accounts with proper naming conventions

Answers

Answer:

The company's account policy

Explanation:

If there's no common naming system, It's best to go with the company's account policy.

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

Answer:

any program designed to do harm.

Explanation:

Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.

discuss any five barries of integrating ict tools in education​

Answers

Answer:

lack of computer, lack of quality software, lack of time, lack of technical programs and lack of teachers

how are the computer classified into different types​

Answers

Answer:

Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

What is office technology?​

Answers

Answer:

Explanation:

Office Technology is the study of a wide range of subjects related to careers in the modern office of today. This program provides the training necessary to perform successfully in the many and varied clerical, secretarial, and office administrative positions.

What contains programming statement written in VB?​

Answers

Answer:

A statement in Visual Basic is a complete instruction. It can contain keywords, operators, variables, constants, and expressions. Each statement belongs to one of the following three categories: Declaration statements, which name a variable, constant, or procedure and can also specify a data type.

write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update. ​

Answers

Answer:

A) software

B)assembler

C)operating system

D)system software

E)data base

F)software license

G)machine code

H)ONLINE shopping apps

You are the IT Administrator for the CorpNet.local domain. You are in the process of implementing a group strategy for your network. You have decided to create global groups as shadow groups for specific departments in your organization. Each global group will contain all users in the corresponding department. In this lab, your task is to: Create the following global security groups on the CorpDC server in their corresponding OUs: OU Creation Location New Group Name Accounting Accounting Research-Dev Research-Dev Sales Sales

Answers

Answer:

1. Select Tools then Active Directory Users from the Server Manager

2. Navigate to the relevant Organizational Unit, OU, in the Active Directory

3. Select New then Group in the OU in which a global securities group is to be created

4. The group name (Accounting, Research-Dev, or Sales) is entered into the Group name field

5. Select the scope of the group

6. The group type is then selected (Domain Local, Global, or Universal)

7. The user accounts are then added to the group as follows;

i) Selecting the Add to a group option after right clicking a user account

ii) Enter the name of the appropriate group in the field to Enter the object names to select

iii) A group scope and group type is then selected

iv) Click on Check names

v) Other users can be added to the group by repeating steps i), ii), iii), and iv)

8) To add additional users to the group, the step 6, 7, and 8 is to be repeated

Explanation:

Kristi, an event planner, wants to store caterers’ names and contact information in an organized manner. Kristi will MOST LIKELY use a

Answers

Answer:

Publisher Program

Explanation:

You manage several Windows systems. Desktop users access an in-house application that is hosted on your intranet web server. When a user clicks a specific option in the application, they receive an error message that the pop-up was blocked. You need to configure the security settings so that users can see the pop-up without compromising overall security. What should you do

Answers

Answer:

Add the URL of the web site to the local intranet zone.

Explanation:

An intranet can be defined as a private computer network established within an organization and is typically used for securely sharing organizational informations, computing resources, operational system, and collaboration tools between employees through an internet protocol (IP). Thus, it's mainly a private network that is only accessible to authorized users or employees within an organization.

An intranet web server is a type of server that manages the request for files that are stored on it and are generally not exposed to the general public.

A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address. Also, the uniform resource locator (URL) is converted to an internet protocol (IP) address, which then points it to a web server.

In this scenario, when a desktop user clicks a specific option in the in-house application that is hosted on an intranet web server, they receive an error message that the pop-up was blocked.

Hence, it's necessary that the security settings of the web server is configured so that users are able to see the popup without compromising overall security. Thus, you should manually add the uniform resource locator (URL) of that particular website to the local intranet zone.

The local intranet zone is a security feature that is typically used for setting web content permissions on a local area network (LAN). Thus, this policy setting or security feature is used for adding websites that aren't residing on a computer or an intranet web server.

Selena owns a bakery. She wants to compare the number of pies, cookies, cakes, and brownies that she sells in one month. Which charts are appropriate for this task? Check all that apply.

Answers

Column, line, bar, and possibly pie.

Answer:

Column, Bar, And Pie

Explanation:

got it right

Anyone know how to make website (PROFESSIONAL)

Answers

Answer:I know how to make a professional website

Explanation:

Other Questions
Calculate the Standard Deviation of the following set of data. 14, 15, 16, 16, 9, 3, 16, 20, 29, 12 Insert the missing number.46 9 142340?138266 The circumference of a circle is 16w.Derive an expression for the area in terms of pi and w Quels produits se vendent typiquement en France, mais se vendent rarement aux tats-Unis.btises de Cambraiproduits au lait crusDpicessantonsgteauxhuile How can beta particles be dangerous to living cells?A. They move fast and penetrate the skin.B. They are very high in energy and can travel through mostmaterials.C. They move slowly but are very large.D. They are very low in energy but remain in the body for a long time. Has anyone ever done an escape room for Alcatraz they can share with me? Find the intensity of the electromagnetic wave described in each case. (a) an electromagnetic wave with a wavelength of 655 nm and a peak electric field magnitude of 1.5 V/m. 0.002984 W/m2 (b) an electromagnetic wave with an angular frequency of 6.5 1018 rad/s and a peak magnetic field magnitude of 1010 T. 1.19366E-6 W/m2 The absolute value inequality equation |2x 1| > 3 will have what type of solution set? You send a team of observers and station one at each machine in your plant. The machinist believes they are studying productivity, while actually they are measuring social interaction between the machinists in order to determine the natural leader. This is an example of Given the arithmetic sequence 2, -7, -16, -25, ..., determine thegeneral term tn. How can we drop eggs the fewest amount of times without breaking it? Why did Mr Vincenti said that it is for our own good that the living cannot generally see the dead? True or False:4x and 4x2 are like terms In this excerpt, a reader can conclude that Lizzie is playful based primarily on her How is citizenship defined differently today than it was when the UnitedStates Constitution and the first New York Constitution were written? please help me please give answer of this please hurry up need some help with this Vit phng trnh ng thng bita) vung gc vi ng thng x+2y=1 v i qua A(1;2)b) i qua gc to v i qua im M (-1;3) cho dy s a[] c n phn t v dy s b[]c m phn t l cc cc s nguyn dng nh hn 1000 . Gi tp hp A l tp cc s khc nhau trong a[], tp hp B l cc s khc nhau trong b[] Please help me. Taylor pays $5.25 for 5 yard of frabric.Whats the cost per yard?Thank you!