During a routine vulnerability assessment, the following command was successful: echo "vrfy 'perl -e 'print "hi" x 500 ' ' " | nc www.company.com 25Which of the following vulnerabilities is being exploited?

A. Buffer overflow directed at a specific host MTA
B. SQL injection directed at a web server
C. Cross-site scripting directed at www.company.com
D. Race condition in a UNIX shell script

Answer: A. Buffer overflow directed at a specific host MTA

Computer Science & Information Technology

You might also like to view...

Which of the following objects cannot trap mouse events?

a. JTextField. b. ButtonGroup. c. JButton. d. JComponent.

Computer Science & Information Technology

To format the slide master background, click the Background Styles button to display the Background Styles gallery.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology