Which of the following should be mitigated by employing proper coding techniques when developing software?

A. Distributed denial of service attacks
B. Buffer overflows
C. War driving
D. Packet sniffing

Answer: B. Buffer overflows

Computer Science & Information Technology

You might also like to view...

Access queries can be used interchangeably in Access and Excel

Indicate whether the statement is true or false

Computer Science & Information Technology

When using the Task Manager, you can identify the files that are used to start a program or other services because they have a file extension of:

A) .gif B) .exe C) .xlsx D) .xml

Computer Science & Information Technology