Which of the following should be mitigated by employing proper coding techniques when developing software?
A. Distributed denial of service attacks
B. Buffer overflows
C. War driving
D. Packet sniffing
Answer: B. Buffer overflows
Computer Science & Information Technology
You might also like to view...
Access queries can be used interchangeably in Access and Excel
Indicate whether the statement is true or false
Computer Science & Information Technology
When using the Task Manager, you can identify the files that are used to start a program or other services because they have a file extension of:
A) .gif B) .exe C) .xlsx D) .xml
Computer Science & Information Technology