If a program writes more information into the computer's memory than the memory was designed to hold, it is a(n) ___________ attack
a. Buffer-overflow
b. RAM
c. Spyware
d. Adware
Answer A. A buffer-overflow attack is also called a buffer-overrun attack.
You might also like to view...
Which of the following was the first law to address computer crime in which the computer is the subject of the crime?
A) Electronic Communications Privacy Act B) Computer Fraud and Abuse Act C) USA PATRIOT Act D) Pen/Trap Statute
Mutual authentication for multiple services is
A) Using software to share photos between two different devices B) Using hardware to share bookmarks between two different devices C) Using software to synchronize data between two different devices D) Using hardware to synchronize data between two different devices
Which of the following types of identity theft/fraud is defined as the use of stolen personal and financial information to facilitate the creation of fraudulent accounts?
a. virtual identity theft/fraud b. criminal record identity theft/fraud c. theft for employment and/or border entry d. credit identity theft/fraud
A table created using the make-table query will not maintain the primary key designation of the underlying table.
Answer the following statement true (T) or false (F)