Buffer overflow in an Internet environment is of particular concern to the IS auditor because it can:
A. corrupt databases during the build.
B. be used to obtain importer access to a system.
C. cause the loss of critical data during processing.
D. cause printers to lose some of the document text when printing.
A. corrupt databases during the build.
B. be used to obtain importer access to a system.
C. cause the loss of critical data during processing.
D. cause printers to lose some of the document text when printing.