Last Updated on August 11, 2021 by Admin 2
John works as a C programmer. He develops the following C program:
His program is vulnerable to a __________ attack.
- SQL injection
- Denial-of-Service
- Buffer overflow
- Cross site scripting
Explanation:
This program takes a user-supplied string and copies it into ‘buffer1’, which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow.
This program takes a user-supplied string and copies it into ‘buffer1’, which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow.
Subscribe
Login
0 Comments