While opening an email attachment, Pete, a customer, receives an error that the application has
encountered an unexpected issue and must be shut down. This could be an example of which of
the following attacks?
A.
Cross-site scripting
B.
Buffer overflow
C.
Header manipulation
D.
Directory traversal