Which attack exploits incorrect boundary checking in network software?
A . Slowloris
B . buffer overflow
C . man-in-the-middle
D . Smurf
Answer: B
Which attack exploits incorrect boundary checking in network software?
A . Slowloris
B . buffer overflow
C . man-in-the-middle
D . Smurf
Answer: B