Ann is concerned that the application her team is currently developing is vulnerable to unexpected
user input that could lead to issues within the memory is affected in a detrimental manner leading
to potential exploitation. Which of the following describes this application threat?
A.
Replay attack
B.
Zero-day exploit
C.
Distributed denial of service
D.
Buffer overflow