A.Stack vulnerabilities B.Heap overflows C.Software overflows D.Buffer overflows
A.Influencing users to forward a call to a toll number (for example, a long distance or international number) B.Influencing users to provide personal information over a web page C.Using an inside facilitator to intentionally forward a call to a toll number (for example, a long distance orinternational number) D.Influencing users to provide personal information over the phone
A.to the zone-pair B.to the zone C.to the interface D.to the global service policy