A program that receives too much data so that it cannot execute instructionsproperly has been exploited by a ___________ attack.
A.
Buffer overflow
B.
TOC/TOU
C.
Covert channel
D.
Data validation
Explanation:
Buffer overflows are common tactics used by hackers to get systems to execute theirmalicious code. They identify an application or operating system that is notperforming proper bounds checking and input a large amount of data that will writeover current memory segments. The data usually contains malicious code that willthen be executed by the system.
A
A