An attacker types more data in a field than the programmer expected. This is a(n) ________ attack

A. buffer overflow
B. denial-of-service
C. directory traversal
D. XSS


A. buffer overflow

Computer Science & Information Technology

You might also like to view...

Which of the following is a legacy data integration tool with a graphical designer that had a limited range of functionality?

A. DTS B. SSIS C. ETL D. FTP

Computer Science & Information Technology

To insert a header, choose Header from the ____________________ tab, in the ____________________ group.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A ____ object represents the policy for a Java application environment.

A. security B. policy C. permission D. grant

Computer Science & Information Technology

Could the LC series processors be made to run faster if it had a second bus? If your answer was no, what else would you need?

What will be an ideal response?

Computer Science & Information Technology