which of the following attacks?

While opening an email attachment, Pete, a customer, receives an error that the application has
encountered an unexpected issue and must be shut down. This could be an example of which of
the following attacks?

While opening an email attachment, Pete, a customer, receives an error that the application has
encountered an unexpected issue and must be shut down. This could be an example of which of
the following attacks?

A.
Cross-site scripting

B.
Buffer overflow

C.
Header manipulation

D.
Directory traversal

Explanation:



Leave a Reply 1

Your email address will not be published. Required fields are marked *

15 + 3 =


Rip

Rip

The. Answer is A