which of the following attacks?

While opening an email attachment, Pete, a customer, receives an error that the application
has encountered an unexpected issue and must be shut down. This could be an example of
which of the following attacks?

While opening an email attachment, Pete, a customer, receives an error that the application
has encountered an unexpected issue and must be shut down. This could be an example of
which of the following attacks?

A.
Cross-site scripting

B.
Buffer overflow

C.
Header manipulation

D.
Directory traversal



Leave a Reply 0

Your email address will not be published. Required fields are marked *

three × four =