Que: _____________ buffer overflows, which are more common among attackers. a. Memory-based b. Queue-based c. Stack-based d. Heap-based Answer: Stack-based