CompTIA CySA+ CS0-003 Practice Question
During a review of the logs, a cybersecurity analyst notices that the data inputs recorded for a machine learning model used in fraud detection exhibit an unusual pattern that significantly deviates from the expected data format and ranges. The anomaly led to a drop in detection accuracy, and subsequent investigations pointed to external manipulation. What type of vulnerability is most likely being exploited in this scenario?
Data poisoning
Parameter tampering
Heap overflow
Cross-site request forgery
SQL injection
Buffer overflow