Which attack exploits incorrect boundary checking in network software?

Which attack exploits incorrect boundary checking in network software?

Which attack exploits incorrect boundary checking in network software?

A.
Slowloris

B.
buffer overflow

C.
man-in-the-middle

D.
Smurf



Leave a Reply 0

Your email address will not be published. Required fields are marked *