hiexam
eccouncil · 312-38 · Q424 · multiple_choice · topic_1

John works as a C programmer. He develops the following C program: //IMG// His program is vulnerable to a __________ a…

John works as a C programmer. He develops the following C program: //IMG// His program is vulnerable to a __________ attack.
  • A.SQL injection
  • B.Denial-of-Service
  • C.Buffer overflow
  • D.Cross site scripting
Explanation
This program takes a user-supplied string and copies it into 'buffer1', which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow.

Reference: examtopics_answer_description

Practice with progress tracking

Sign in to track wrong answers, get spaced-repetition reminders, and run timed exam mode.