CompTIA CySA+ CS0-003 Practice Question
During a review of the logs, a cybersecurity analyst notices that the data inputs recorded for a machine learning model used in fraud detection exhibit an unusual pattern that significantly deviates from the expected data format and ranges. The anomaly led to a drop in detection accuracy, and subsequent investigations pointed to external manipulation. What type of vulnerability is most likely being exploited in this scenario?
SQL injection
Heap overflow
Data poisoning
Parameter tampering
Buffer overflow
Cross-site request forgery