Buffer () cause many software weaknesses and, therefore, are the basis of malicious exploits.
A. Interrupt
B. Default
C. Underflow
D. Overflow
有疑问?点此联系我们
收藏该题
查看答案