An attacker types more data in a field than the programmer expected. This is a(n) ________ attack

A. buffer overflow
B. denial-of-service
C. directory traversal
D. XSS

A. buffer overflow

Computer Science & Information Technology

You might also like to view...

Which of the following would be used to implement digital phone service inside of a large company?

A. LDAP B. Fiber C. PSTN D. VoIP

Computer Science & Information Technology

Which of the following methods is NOT called by the nonrecursive stack version of the isPath method?

a) insertAdjacent b) unvisitAll c) markVisited d) getNextCity

Computer Science & Information Technology