CompTIA Exam Questions

Which of the following attacks is being leveraged?

An attacker is attempting to exploit the username field of an application. The exploitation involves writing more data than the field variable is initialized for. Which of
the following attacks is being leveraged?

A.
Buffer overflow

B.
Integer overflow

C.
XML injection

D.
Session hijacking