John works as a C programmer. He develops the following C program:
John works as a C programmer. He develops the following C program:
His program is vulnerable to a __________ attack.
A . SQL injection
B . Denial-of-Service
C . Buffer overflow
D . Cross site scripting
Answer: C
Explanation:
This program takes a user-supplied string and copies it into ‘buffer1’, which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow.
Latest 312-38 Dumps Valid Version with 120 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments