A program that receives too much data so that it cannot execute instructionsproperly has been exploited by a ___________ attack.

A program that receives too much data so that it cannot execute instructionsproperly has been exploited by a ___________ attack.

A program that receives too much data so that it cannot execute instructionsproperly has been exploited by a ___________ attack.

A.
Buffer overflow

B.
TOC/TOU

C.
Covert channel

D.
Data validation

Explanation:
Buffer overflows are common tactics used by hackers to get systems to execute theirmalicious code. They identify an application or operating system that is notperforming proper bounds checking and input a large amount of data that will writeover current memory segments. The data usually contains malicious code that willthen be executed by the system.



Leave a Reply 2

Your email address will not be published. Required fields are marked *