Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?

A CGI application on the company’s Web server has a bug written into it. This particular bug allows the application to write data into an area of memory that has not been properly allocated to the application. An attacker has created an application that takes advantage of this bug to obtain credit card information.

Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?
A . – Buffer overflow
– Work with the Web developer to solve the problem

B . – SQL injection
– Work with a database administrator to solve the problem
C . – Denial of service
– Contact the organization that wrote the code for the Web server
D . – Man-in-the-middle attack
– Contact the company auditor

Answer: A

Latest 1D0-671 Dumps Valid Version with 125 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments