What type of attack exploits a lack of bounds checking on the size of data stored in an array?
A. buffer overflow
B. SQL injection
C. phishing
D. ActiveX control
Answer: A
Computer Science & Information Technology
You might also like to view...
An air filter mask sometimes used by a computer or network technician is a type of breathing tank
Indicate whether the statement is true or false
Computer Science & Information Technology
A ________ is a large collection of information that is larger than a data dictionary.
A) repository B) schema C) data element D) data alias
Computer Science & Information Technology