What type of attack exploits a lack of bounds checking on the size of data stored in an array?

A. buffer overflow
B. SQL injection
C. phishing
D. ActiveX control

Answer: A

Computer Science & Information Technology

You might also like to view...

An air filter mask sometimes used by a computer or network technician is a type of breathing tank

Indicate whether the statement is true or false

Computer Science & Information Technology

A ________ is a large collection of information that is larger than a data dictionary.

A) repository B) schema C) data element D) data alias

Computer Science & Information Technology