A server administrator notes that a fully patched application often stops running due to a memory error. When reviewing the debugging logs they notice code being run calling an internal process to exploit the machine. Which of the following attacks does this describes?
A. Malicious add-on
B. SQL injection
C. Cross site scripting
D. Zero-day
Answer: D. Zero-day
Computer Science & Information Technology
You might also like to view...
Where in Muse can you change the Title text for a text link?
What will be an ideal response?
Computer Science & Information Technology
The third part of the filename is the software ____.
A. architecture B. release number C. date D. version
Computer Science & Information Technology
____ attacks often involve the act of obtaining passwords or specific pieces of information through iterative trial and error.
A. Conditional B. Schematic C. Brute force D. Row set
Computer Science & Information Technology
Why are NICs not concerned with the data within the frames they process?
What will be an ideal response?
Computer Science & Information Technology