An attacker types more data in a field than the programmer expected. This is a(n) ________ attack
A. directory traversal
B. buffer overflow
C. XSS
D. denial-of-service
B. buffer overflow
Computer Science & Information Technology
You might also like to view...
What is the value stored in num after the following statement executes?
``` num = atoi("1000"); ``` a. 1000 b. 999 c. "1000" d. "1 thousand" e. None of these
Computer Science & Information Technology
Google+ demographics are similar to those of Facebook and other similar social networks
Indicate whether the statement is true or false
Computer Science & Information Technology
Describe an Intrusion Detection System.
What will be an ideal response?
Computer Science & Information Technology
A secondary memory device depends on electricity to maintain its values.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology