Multiple Choice
What is a buffer overflow attack?
A) It is an attack when the perpetrator is inserting malicious query in input such that it is passed to and executed by an application program.
B) It is an attack when the perpetrator is inputting so much data that the input buffer overflows.The overflow contains code that takes control of the company's computer.
C) It is an attack when the perpetrator uses software to guess company's addresses,send employees blank e-mails,and add unreturned messages to spammer e-mail list.
D) It is an attacked when the perpetrator sends hundreds of messages from randomly generated false addresses,overloading an Internet service provider's e-mail server.
Correct Answer:

Verified
Correct Answer:
Verified
Q31: Inspecting information packets as they travel across
Q32: Someone knocked on your door on a
Q33: When a computer criminal gains access to
Q34: Sending an unsolicited message to many people
Q35: Tapping into a communications line and then
Q37: Computer fraud perpetrators that modify programs during
Q38: Ashley Baker has been the webmaster for
Q39: Describe the differences between spyware,scareware,and ransomware.
Q40: Changing data before or during entry into
Q41: Describe the various form of spoofing.Select one