Ann is concerned that the application her team is currently developing is vulnerable to unexpected user
input that could lead to issues within the memory is affected in a detrimental manner leading to potential
exploitation. Which of the following describes this application threat?
A.
Replay attack
B.
Zero-day exploit
C.
Distributed denial of service
D.
Buffer overflow
I think the correct answer is D. The keyword is “memory” on the question.
0
0
I picked Buffer Overflow as well. “Unexpected user input” is another important factor.
0
0
It is D Buffer overflow–more commonly known as heap stack buffer overflow attack.
0
0
It is D: the concern is also potential exploitation [confidentiality and integrity] and not loss of availability [DoS].
0
0
It’s D.
Fisher’s book:
buffer overflow When a process stores data outside the memory that the developer
intended to be used for storage. This could cause erratic behavior in the application,especially if the memory already had other data in it.
0
0