When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?
A. buffer overflow
B. DoS
C. DDoS
D. session hijacking
Answer: A
Computer Science & Information Technology
You might also like to view...
A nonmember function can access private class data members as a(n) ____.
a. operator b. friend c. static function d. privileged function
Computer Science & Information Technology
Each Group Policy Object is assigned a globally unique identifier (GUID) of what length?
A. 16 bits B. 32 bits C. 64 bits D. 128 bits
Computer Science & Information Technology
Preconfigured, predetermined attack patterns are called signatures. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following multimedia elements cannot be included in a Flash movie?
A. Scripted objects B. Voiceovers C. Clickable links D. Mouse code
Computer Science & Information Technology