John works as a C programmer. He develops the following C program:
//IMG//
His program is vulnerable to a __________ attack.
- A.SQL injection
- B.Denial-of-Service
- C.Buffer overflow
- D.Cross site scripting
Reference: examtopics_answer_description
Sign in to track wrong answers, get spaced-repetition reminders, and run timed exam mode.