A systems administrator is reviewing the following information from a compromised server:
Given the above information, which of the following processes was MOST likely exploited via a remote buffer overflow attack?
Click on the arrows to vote for the correct answer
A. B. C. D.A.