An attacker types more data in a field than the programmer expected. This is a(n) ________ attack

A.buffer overflow
B. denial-of-service
C. directory traversal
D. XSS


A.buffer overflow

Computer Science & Information Technology

You might also like to view...

When components are added to a container with a GridLayout, the component ________.

a. fills the next spot in the row, continuing in the first position of the next row if the current row is full b. fills the next spot in the column, continuing in the first position of the next column if the column is full c. fills in row x, column y if x and y are two integers passed to the Container method add d. fills in a random empty position in the grid

Computer Science & Information Technology

Critical Thinking QuestionsCase 5-2You are planning to create a new informational Web site for your travel club. Jack, the club president, suggests that you can quickly lay out the site's pages using either a frameset or layout tables.After researching page layout issues, you decide that using layout tables to control page layout ____. a. is a trendy and popular approachc. would make it much easier to insert images and links on a pageb. is a good choice because you have a lot of experience working with tables in a word processord. is not a standards-compliant approach

What will be an ideal response?

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. Every user accesses the Internet with the same speed. 2. GIF, JPEG, and PNG files are resolution dependent. 3. Indexing can be used when saving a file in the JPEG format. 4. Because most desktop printers are configured to print from RGB mode, you do not need to convert your image to CMYK mode when using a desktop printer.

Computer Science & Information Technology

?21. A digital ____ is a pattern containing copyright information that is inserted into a digital image, animation, or audio or video file.

A. ?web bug B. ?worm C. ?watermark D. ?stenograph

Computer Science & Information Technology