CompTIA CySA+ CS0-003 Practice Question
During a review of the logs, a cybersecurity analyst notices that the data inputs recorded for a machine learning model used in fraud detection exhibit an unusual pattern that significantly deviates from the expected data format and ranges. The anomaly led to a drop in detection accuracy, and subsequent investigations pointed to external manipulation. What type of vulnerability is most likely being exploited in this scenario?
Heap overflow
SQL injection
Cross-site request forgery
Buffer overflow
Data poisoning
Parameter tampering