Exam4Training

Which attack exploits incorrect boundary checking in network software?

Which attack exploits incorrect boundary checking in network software?
A . Slowloris
B . buffer overflow
C . man-in-the-middle
D . Smurf

Answer: B

Exit mobile version