If a program writes more information into the computer's memory than the memory was designed to hold, it is a(n) ___________ attack

a. Buffer-overflow
b. RAM
c. Spyware
d. Adware


Answer A. A buffer-overflow attack is also called a buffer-overrun attack.

Computer Science & Information Technology

You might also like to view...

Which of the following was the first law to address computer crime in which the computer is the subject of the crime?

A) Electronic Communications Privacy Act B) Computer Fraud and Abuse Act C) USA PATRIOT Act D) Pen/Trap Statute

Computer Science & Information Technology

Mutual authentication for multiple services is

A) Using software to share photos between two different devices B) Using hardware to share bookmarks between two different devices C) Using software to synchronize data between two different devices D) Using hardware to synchronize data between two different devices

Computer Science & Information Technology

Which of the following types of identity theft/fraud is defined as the use of stolen personal and financial information to facilitate the creation of fraudulent accounts?

a. virtual identity theft/fraud b. criminal record identity theft/fraud c. theft for employment and/or border entry d. credit identity theft/fraud

Computer Science & Information Technology

A table created using the make-table query will not maintain the primary key designation of the underlying table.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology