John works as a C programmer. He develops the following C program:His program is vulnerable to a __________ attack. A. SQL injection B. Denial-of-Service C. Buffer overflow D. Cross site scripting Suggested Answer: C Community Answer: C This program takes a user-supplied string and copies it into 'buffer1', which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow. This question is in 312-38 Certified Network Defender Exam For getting Certified Network Defender (CND) Disclaimers: The website is not related to, affiliated with, endorsed or authorized by EC-Council. Trademarks, certification & product names are used for reference only and belong to EC-Council. The website does not contain actual questions and answers from EC-Council's Certification Exams.
Please login or Register to submit your answer