What action would allow the attacker to gain access to machine 1 but not machine 2?

An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows.

What action would allow the attacker to gain access to machine 1 but not machine 2?
A . sniffing the packets between the two hosts
B . sending continuous pings
C . overflowing the buffer’s memory
D . inserting malicious commands into the database

Answer: D

Explanation:

Latest 350-701 Dumps Valid Version with 327 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments