An attacker types more data in a field than the programmer expected. This is a(n) ________ attack

A. XSS
B. directory traversal
C. denial-of-service
D. buffer overflow


D. buffer overflow

Computer Science & Information Technology

You might also like to view...

To start the YaST NIS Server module, use the ____ command.

A. start yast2 nis-srvr B. start yast2 nis-server C. yast2 nis-srvr D. yast2 nis-server

Computer Science & Information Technology

Page numbers in the body of the report are generally positioned at the ____.

A. bottom center B. bottom right C. top center D. top right

Computer Science & Information Technology

Amazon S3 buckets in the US Standard region do not provide eventual consistency.

A. True B. False

Computer Science & Information Technology

To get more information about the union command, type ____________________ at the command prompt.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology