Which attack exploits incorrect boundary checking in network software?
A.
Slowloris
B.
buffer overflow
C.
man-in-the-middle
D.
Smurf
Which attack exploits incorrect boundary checking in network software?
Which attack exploits incorrect boundary checking in network software?
A.
Slowloris
B.
buffer overflow
C.
man-in-the-middle
D.
Smurf