An attacker types more data in a field than the programmer expected. This is a(n) ________ attack
A. directory traversal
B. buffer overflow
C. XSS
D. denial-of-service
B. buffer overflow
Computer Science & Information Technology
You might also like to view...
By default, records in a table or query are sorted by the ________ field
Fill in the blank(s) with correct word
Computer Science & Information Technology
By default, Excel displays a chart as a(n) ________ object within the worksheet
A) layered B) embedded C) selected D) separate
Computer Science & Information Technology