A stack overflow attack that “crashes” a Transmission Control Protocol/Internet Protocol (TCP/IP)
service daemon can result in a serious security breach because the

A.
Process does not implement proper object reuse.
B.
Process is executed by a privileged entity.
C.
Network interface becomes promiscuous.
D.
Daemon can be replaced by a trojan horse.