John works as a C programmer. He develops the following C program:

John works as a C programmer. He develops the following C program:

His program is vulnerable to a __________ attack.
A . SQL injection
B . Denial-of-Service
C . Buffer overflow
D . Cross site scripting

Answer: C

Explanation:

This program takes a user-supplied string and copies it into ‘buffer1’, which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow.

Latest 312-38 Dumps Valid Version with 120 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments