When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?
A. buffer overflow
B. DoS
C. DDoS
D. session hijacking
Answer: A
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT true about why people tweet?
A) Universities use Twitter to promote their brands and products, making announcements via their Twitter feeds. B) News organizations use Twitter to disseminate the latest news headlines. C) Some people use Twitter as a kind of personal blog, posting random thoughts and comments for all to read. D) Some people use Twitter to inform friends and family of what they're doing or thinking.
Computer Science & Information Technology
YACC uses the formal model of ______ for semantic content of a program.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology