The programmer confirms that there is potential for a buffer overflow on one of the data input fields in a
corporate application. The security analyst classifies this as a (N).
A.
Threat
B.
Risk
C.
Attack
D.
Vulnerability
The programmer confirms that there is potential for a buffer overflow on one of the data input fields in a
corporate application. The security analyst classifies this as a (N).
The programmer confirms that there is potential for a buffer overflow on one of the data input fields in a
corporate application. The security analyst classifies this as a (N).
A.
Threat
B.
Risk
C.
Attack
D.
Vulnerability