List of questions
Related questions
Question 19 - 312-38 discussion
John works as a C programmer. He develops the following C program:
His program is vulnerable to a __________ attack.
A.
SQL injection
B.
Denial-of-Service
C.
Buffer overflow
D.
Cross site scripting
Your answer:
0 comments
Sorted by
Leave a comment first