An attacker types more data in a field than the programmer expected. This is a(n) ________ attack

A. directory traversal
B. buffer overflow
C. XSS
D. denial-of-service

B. buffer overflow

Computer Science & Information Technology

You might also like to view...

By default, records in a table or query are sorted by the ________ field

Fill in the blank(s) with correct word

Computer Science & Information Technology

By default, Excel displays a chart as a(n) ________ object within the worksheet

A) layered B) embedded C) selected D) separate

Computer Science & Information Technology