Ann is concerned that the application her team is currently developing is vulnerable to unexpected user input that could lead to issues within the memory is affected in a detrimental manner leading to potential exploitation. Which of the following describes this application threat?
A. Replay attack
B. Zero-day exploit
C. Distributed denial of service
D. Buffer overflow
Answer: C. Distributed denial of service
You might also like to view...
Which statement copies a string from a text box named txtLastName, converts the string to lowercase and saves the string in strLastName?
a. strLastName = txtLastName b. txtLastName.Text = strLastName(ToLower) c. strLastName = ToLower(txtLastName.Text) d. strLastName = txtLastName.Text.ToLower()
List the three types of VLANs.
What will be an ideal response?
Which of the following creates a multiply effect by decreasing brightness?
A. Color Burn B. Dark Burn C. Light Linear Burn D. Linear Burn
Before working with a macro, you must first ________
A) add the Developer tab to the ribbon B) close your workbook C) build an action D) single out tasks to be completed