The programmer confirms that there is potential for a buffer overflow on one of the data input fields in a corporate application. The security analyst classifies this as a (N).
A. Threat
B. Risk
C. Attack
D. Vulnerability
Answer: D. Vulnerability
Computer Science & Information Technology
You might also like to view...
Clicking the AutoSum button displays a list of additional numeric functions such as COUNT and MAX
Indicate whether the statement is true or false
Computer Science & Information Technology
What device is used to scan the chip embedded in devices such as ID badges?
A. Smart card reader B. FireWire controller C. USB bridge D. USB reader
Computer Science & Information Technology