One common vulnerability exploitation method is a_______, in which a program is overwhelmed by an input of more data than it has allocated space for.
a) buffer overflow.
b) memory flood.
c) buffer flood.
d) None of the above
a) buffer overflow.
Computer Science & Information Technology
You might also like to view...
All pie charts include leaders
Indicate whether the statement is true or false
Computer Science & Information Technology
The ________ maintains the topology information for the network and calculates routes in the network.
A) Application layer B) Topology manager C) Link discovery D) Resource layer
Computer Science & Information Technology