A programmer has allocated a 32 bit variable to store the results of an operation between two user supplied 4 byte operands. To which of the following types of attack is this application susceptible?
A. XML injection
B. Command injection
C. Integer overflow
D. Header manipulation
Answer: B. Command injection
Computer Science & Information Technology
You might also like to view...
The process of preparing for an operating system installation includes verifying that your system has sufficient performance and free disk space for the installation
Indicate whether the statement is true or false
Computer Science & Information Technology
Which one of the following is not a federal regulation concerning use of the police radio?
a. Officers must use the 10 signals. b. Radio must be used for official police business. c. No profanity is permitted. d. No superfluous calls are permitted.
Computer Science & Information Technology