John works as a C programmer. He develops the following C program: His program is vulnerable to a __________ attack.

Last Updated on August 11, 2021 by Admin 2

John works as a C programmer. He develops the following C program:

312-38 Part 01 Q01 001
312-38 Part 01 Q01 001

His program is vulnerable to a __________ attack.

  • SQL injection
  • Denial-of-Service
  • Buffer overflow
  • Cross site scripting
Explanation:
This program takes a user-supplied string and copies it into ‘buffer1’, which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow.

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments