An attacker types more data in a field than the programmer expected. This is a(n) ________ attack
A. XSS
B. directory traversal
C. denial-of-service
D. buffer overflow
D. buffer overflow
Computer Science & Information Technology
You might also like to view...
The keyboard shortcut to duplicate an object is CTRL + D
Indicate whether the statement is true or false
Computer Science & Information Technology
In Resource Sheet view of Project 2013, the ________ column determines which calendar your resource will be assigned
A) Base B) Max C) Accrue D) Initial
Computer Science & Information Technology