nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #327

CERTIFIED-IN-CYBERSECURITY Question #327: Real Exam Question with Answer & Explanation

The correct answer is D: Buffer Overflow Attack. A Buffer Overflow attack is a type of attack that involves sending malicious data to an application or system, causing it to crash or become unresponsive. This type of attack takes advantage of programming errors in applications or systems that allow attackers to send malicious d

Domain 4: Network Security

Question

Which type of network attack involves an attacker sending specially crafted malicious data to an application or system, causing it to crash or become unresponsive? ()

Options

  • ASQL Injection Attack
  • BMan-in-the-Middle Attack
  • CDistributed Denial-of-Service Attack
  • DBuffer Overflow Attack

Explanation

A Buffer Overflow attack is a type of attack that involves sending malicious data to an application or system, causing it to crash or become unresponsive. This type of attack takes advantage of programming errors in applications or systems that allow attackers to send malicious data that exceeds the size of the allocated memory buffer, causing the application or system to crash or become unresponsive. The other options are not related to a Buffer Overflow attack. A Man-in- the-Middle attack is a type of attack that involves an attacker intercepting and manipulating data between two parties. A Distributed Denial-of-Service attack is an attack in which an attacker attempts to make a service or network resource unavailable by flooding it with requests. A SQL Injection attack is a type of attack that involves sending malicious data to an application or system, allowing the attacker to access sensitive data.

Topics

#Buffer Overflow#Network Attacks#Vulnerability Exploitation#Application Security

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions