Ann is concerned that the application her team is currently developing is vulnerable to unexpected user input that could lead to issues within the memory is affected in a detrimental manner leading to potential exploitation. Which of the following describes this application threat?

A. Replay attack
B. Zero-day exploit
C. Distributed denial of service
D. Buffer overflow


Answer: C. Distributed denial of service

Computer Science & Information Technology

You might also like to view...

Which statement copies a string from a text box named txtLastName, converts the string to lowercase and saves the string in strLastName?

a. strLastName = txtLastName b. txtLastName.Text = strLastName(ToLower) c. strLastName = ToLower(txtLastName.Text) d. strLastName = txtLastName.Text.ToLower()

Computer Science & Information Technology

List the three types of VLANs.

What will be an ideal response?

Computer Science & Information Technology

Which of the following creates a multiply effect by decreasing brightness?

A. Color Burn B. Dark Burn C. Light Linear Burn D. Linear Burn

Computer Science & Information Technology

Before working with a macro, you must first ________

A) add the Developer tab to the ribbon B) close your workbook C) build an action D) single out tasks to be completed

Computer Science & Information Technology