When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?

A. buffer overflow
B. DoS
C. DDoS
D. session hijacking


Answer: A

Computer Science & Information Technology

You might also like to view...

A nonmember function can access private class data members as a(n) ____.

a. operator b. friend c. static function d. privileged function

Computer Science & Information Technology

Each Group Policy Object is assigned a globally unique identifier (GUID) of what length?

A. 16 bits B. 32 bits C. 64 bits D. 128 bits

Computer Science & Information Technology

Preconfigured, predetermined attack patterns are called signatures. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following multimedia elements cannot be included in a Flash movie?

A. Scripted objects B. Voiceovers C. Clickable links D. Mouse code

Computer Science & Information Technology