List of questions
Related questions
Question 162 - 350-701 discussion
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?
A.
sniffing the packets between the two hosts
B.
sending continuous pings
C.
overflowing the buffer's memory
D.
inserting malicious commands into the database
Your answer:
0 comments
Sorted by
Leave a comment first