Which of the following describes this application threat?

Ann is concerned that the application her team is currently developing is vulnerable to unexpected user input
that could lead to issues within the memory is affected in a detrimental manner leading to potential exploitation.
Which of the following describes this application threat?

Ann is concerned that the application her team is currently developing is vulnerable to unexpected user input
that could lead to issues within the memory is affected in a detrimental manner leading to potential exploitation.
Which of the following describes this application threat?

A.
Replay attack

B.
Zero-day exploit

C.
Distributed denial of service

D.
Buffer overflow



Leave a Reply 0

Your email address will not be published. Required fields are marked *