Which of the following describes this application threat?

Ann is concerned that the application her team is currently developing is vulnerable to unexpected
user input that could lead to issues within the memory is affected in a detrimental manner leading
to potential exploitation. Which of the following describes this application threat?

Ann is concerned that the application her team is currently developing is vulnerable to unexpected
user input that could lead to issues within the memory is affected in a detrimental manner leading
to potential exploitation. Which of the following describes this application threat?

A.
Replay attack

B.
Zero-day exploit

C.
Distributed denial of service

D.
Buffer overflow



Leave a Reply to JV Cancel reply2

Your email address will not be published. Required fields are marked *

10 + 4 =


Chelle

Chelle

Correct answer is buffer overflow

JV

JV

Wrong Answer C:
A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a botnet) flooding the targeted system with traffic.