John works as a C programmer. He develops the following C program: His program is vulnerable to a __________ attack.

QuestionsCategory: 312-38John works as a C programmer. He develops the following C program: His program is vulnerable to a __________ attack.
Admin Staff asked 5 months ago
John works as a C programmer. He develops the following C program:
 Image
His program is vulnerable to a __________ attack.

A. SQL injection

B. Denial-of-Service

C. Buffer overflow

D. Cross site scripting








 

Suggested Answer: C

Community Answer: C

This program takes a user-supplied string and copies it into 'buffer1', which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow.

This question is in 312-38 Certified Network Defender Exam
For getting Certified Network Defender (CND)








Disclaimers:
The website is not related to, affiliated with, endorsed or authorized by EC-Council. 
Trademarks, certification & product names are used for reference only and belong to EC-Council.
The website does not contain actual questions and answers from EC-Council's Certification Exams.

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.