An attacker types more data in a field than the programmer expected. This is a(n) ________ attack
A. buffer overflow
B. denial-of-service
C. directory traversal
D. XSS
A. buffer overflow
Computer Science & Information Technology
You might also like to view...
Which of the following would be used to implement digital phone service inside of a large company?
A. LDAP B. Fiber C. PSTN D. VoIP
Computer Science & Information Technology
Which of the following methods is NOT called by the nonrecursive stack version of the isPath method?
a) insertAdjacent b) unvisitAll c) markVisited d) getNextCity
Computer Science & Information Technology