Answer:
Using non-executable stacks in memory corruption attacks limits the execution of code from the stack, reducing the risk of exploitation.
Using non-executable stacks in memory corruption attacks limits the execution of code from the stack, reducing the risk of exploitation.
You may be interested in:
Web Security MCQs