The programmer confirms that there is potential for a buffer overflow on one of the data input fields in a corporate application. The security analyst classifies this as a (N).

A. Threat
B. Risk
C. Attack
D. Vulnerability

Answer: D. Vulnerability

Computer Science & Information Technology

You might also like to view...

Clicking the AutoSum button displays a list of additional numeric functions such as COUNT and MAX

Indicate whether the statement is true or false

Computer Science & Information Technology

What device is used to scan the chip embedded in devices such as ID badges?

A. Smart card reader B. FireWire controller C. USB bridge D. USB reader

Computer Science & Information Technology