# 312-38 — Question 424

**Type:** multiple_choice
**Topics:** topic_1

## Question

John works as a C programmer. He develops the following C program:
//IMG//

His program is vulnerable to a __________ attack.

## Correct Answer

_See scenario._

## Explanation

This program takes a user-supplied string and copies it into 'buffer1', which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow.

**Reference:** examtopics_answer_description

---
Source: https://hiexam.net/q/eccouncil/312-38/424  
Practice (tracked): https://hiexam.net/study/312-38/practice