Sara, a security administrator, examines a network session to a compromised database server with a packet analyzer. Within the session there is a repeated series of the hex character 90 (x90). Which of the following attack types has occurred?

A. Buffer overflow
B. Cross-site scripting
C. XML injection
D. SQL injection


Answer: A. Buffer overflow

Computer Science & Information Technology

You might also like to view...

Placing throw() after a function's parameter list:

a. Guarantees that all exceptions can be thrown in this function. b. Guarantees that only programmer-defined exceptions can be thrown in this function. c. Indicates that throwing an exception in this function would call unexpected. d. Indicates that the compiler will issue an error if the function contains a throw expression.

Computer Science & Information Technology

What is the term used to describe a broad and comprehensive model that covers a given field?

A. Wildcard framework B. Uniform framework C. Expanding framework D. Umbrella framework

Computer Science & Information Technology

Which programming language is used by Apple for iPhone application software?

a. Perl b. C# c. Java d. JavaScript e. Objective C

Computer Science & Information Technology

You want to configure EIGRP on five interfaces all in the 10.X.X.X network range using a single command. What command does this?

A) network 10.0.0.0 mask 255.0.0.0 B) network 10.0.0.0 0.255.255.255 area 0 C) network 10.0.0.0 255.0.0.0 D) network 10.0.0.0

Computer Science & Information Technology