This could be an example of which of the following attacks?

While opening an email attachment, Pete, a customer, receives an error that the application has encountered an unexpected issue and must be shut down. This could be an example of which of the following attacks?

While opening an email attachment, Pete, a customer, receives an error that the application has encountered an unexpected issue and must be shut down. This could be an example of which of the following attacks?

A.
Cross-site scripting

B.
Buffer overflow

C.
Header manipulation

D.
Directory traversal



Leave a Reply 0

Your email address will not be published. Required fields are marked *