ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 19 - 312-38 discussion

Report
Export

John works as a C programmer. He develops the following C program:

His program is vulnerable to a __________ attack.

A.
SQL injection
Answers
A.
SQL injection
B.
Denial-of-Service
Answers
B.
Denial-of-Service
C.
Buffer overflow
Answers
C.
Buffer overflow
D.
Cross site scripting
Answers
D.
Cross site scripting
Suggested answer: C

Explanation:

This program takes a user-supplied string and copies it into 'buffer1', which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow.

asked 18/09/2024
Ranjan Gupta
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first