Which of the following BEST identifies this application attack?

An application developer has neglected to include input validation checks in the design of the company’s new web application. An employee discovers that repeatedly submitting large amounts of data, including custom code, to an application will allow the execution of the custom code at the administrator level.

Which of the following BEST identifies this application attack?
A . Cross-site scripting
B . Clickjacking
C . Buffer overflow
D . Replay

Answer: C

Latest SY0-501 Dumps Valid Version with 1130 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments