The following code is an example of what type of attack? #include char *code = "AAAABBBBCCCCDDD"; //including the character '
A. SQL injection
B. buffer overflow
C. cross site scripting
D. integer overflow
B
Explanation: The listed code is an example of a buffer overflow. In this example, 16 characters are being sent to a buffer that is only 8 bytes.
You might also like to view...
Typically, a user accesses a computer through __________ and the application logic communicates with UNIX through __________.
a. an application programming interface/an application program’s interface b. an application program’s interface/scripts c. an application program’s interface/an application programming interface d. line commands/scripts
The Chart ________ walks you through creating a chart
A) Creation tool B) Developer C) Wizard D) Formatting tool
?A user has to provide a valid password to gain access to a vault in a bank. In addition to this, the vault opens only when the user's fingerprint matches the fingerprint data stored in the database or when a valid smartcard is swiped. The authentication method used here is _____.
A. ?hard-drill authentication B. ?zip-level authentication C. ?two-factor authentication D. ?private-key authentication
Common fields for related tables may not have the same name, but they must have the same data type and field size.
a. true b. false