The following code is an example of what type of attack? #include char *code = "AAAABBBBCCCCDDD"; //including the character '

A. SQL injection
B. buffer overflow
C. cross site scripting
D. integer overflow


B
Explanation: The listed code is an example of a buffer overflow. In this example, 16 characters are being sent to a buffer that is only 8 bytes.

Computer Science & Information Technology

You might also like to view...

Typically, a user accesses a computer through __________ and the application logic communicates with UNIX through __________.

a. an application programming interface/an application program’s interface b. an application program’s interface/scripts c. an application program’s interface/an application programming interface d. line commands/scripts

Computer Science & Information Technology

The Chart ________ walks you through creating a chart

A) Creation tool B) Developer C) Wizard D) Formatting tool

Computer Science & Information Technology

?A user has to provide a valid password to gain access to a vault in a bank. In addition to this, the vault opens only when the user's fingerprint matches the fingerprint data stored in the database or when a valid smartcard is swiped. The authentication method used here is _____.

A. ?hard-drill authentication B. ?zip-level authentication C. ?two-factor authentication D. ?private-key authentication

Computer Science & Information Technology

Common fields for related tables may not have the same name, but they must have the same data type and field size.

a. true b. false

Computer Science & Information Technology