One common vulnerability exploitation method is a_______, in which a program is overwhelmed by an input of more data than it has allocated space for.

a) buffer overflow.
b) memory flood.
c) buffer flood.
d) None of the above

a) buffer overflow.

Computer Science & Information Technology

You might also like to view...

All pie charts include leaders

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ maintains the topology information for the network and calculates routes in the network.

A) Application layer B) Topology manager C) Link discovery D) Resource layer

Computer Science & Information Technology