Asked by .,.,.,

Which of the following attacks is a form of software exploitation that transmits or submits a longer stream of data than the input variable is designed to handle?

answer

Time-of-check to time-of-use attack


Buffer overflow attack


Data diddling


Smurf attack

All Answers 1

Answered by GPT-5 mini AI
Buffer overflow attack

This occurs when input exceeds the size of a buffer, overwriting adjacent memory and potentially allowing arbitrary code execution or crashes.