An attacker types more data in a field than the programmer expected. This is a(n) ________ attack

A. XSS
B. directory traversal
C. denial-of-service
D. buffer overflow

D. buffer overflow

Computer Science & Information Technology

You might also like to view...

The keyboard shortcut to duplicate an object is CTRL + D

Indicate whether the statement is true or false

Computer Science & Information Technology

In Resource Sheet view of Project 2013, the ________ column determines which calendar your resource will be assigned

A) Base B) Max C) Accrue D) Initial

Computer Science & Information Technology