A server administrator notes that a fully patched application often stops running due to a memory error. When reviewing the debugging logs they notice code being run calling an internal process to exploit the machine. Which of the following attacks does this describes?

A. Malicious add-on
B. SQL injection
C. Cross site scripting
D. Zero-day


Answer: D. Zero-day

Computer Science & Information Technology

You might also like to view...

Where in Muse can you change the Title text for a text link?

What will be an ideal response?

Computer Science & Information Technology

The third part of the filename is the software ____.

A. architecture B. release number C. date D. version

Computer Science & Information Technology

____ attacks often involve the act of obtaining passwords or specific pieces of information through iterative trial and error.

A. Conditional B. Schematic C. Brute force D. Row set

Computer Science & Information Technology

Why are NICs not concerned with the data within the frames they process?

What will be an ideal response?

Computer Science & Information Technology