C. Malicious code is copied to the allocated space of an already running process.
Explanation:
Memory injection occurs when malicious code is directly injected into the memory space of an already running process. This type of attack bypasses the need to write malicious code to disk, making it harder to detect with traditional file-based antivirus solutions. Examples include DLL injection or process hollowing.
Why not the other options?
A. Two processes access the same variable, allowing one to cause a privilege escalation: This describes a race condition, not memory injection.
B. A process receives an unexpected amount of data, which causes malicious code to be executed: This describes a buffer overflow, which is a precursor to injection attacks but not memory injection itself.
From ChatGPT
Memory injection is a technique where malicious code is directly injected into the memory space of an already running process, allowing the attacker to execute unauthorized commands or manipulate the process. This method bypasses traditional file-based malware detection because no malicious executable is written to disk.
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.SY0-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Anyio
3 months agoumavaja
3 months ago