An attacker types more data in a field than the programmer expected. This is a(n) ________ attack

A. directory traversal
B. buffer overflow
C. XSS
D. denial-of-service


B. buffer overflow

Computer Science & Information Technology

You might also like to view...

What is the value stored in num after the following statement executes?

``` num = atoi("1000"); ``` a. 1000 b. 999 c. "1000" d. "1 thousand" e. None of these

Computer Science & Information Technology

Google+ demographics are similar to those of Facebook and other similar social networks

Indicate whether the statement is true or false

Computer Science & Information Technology

Describe an Intrusion Detection System.

What will be an ideal response?

Computer Science & Information Technology

A secondary memory device depends on electricity to maintain its values.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology