Ann is concerned that the application her team is currently developing is vulnerable to unexpected user
input that could lead to issues within the memory is affected in a detrimental manner leading to potential
exploitation. Which of the following describes this application threat?
A.
Replay attack
B.
Zero-day exploit
C.
Distributed denial of service
D.
Buffer overflow