A programmer has allocated a 32 bit variable to store the results of an operation between two user supplied 4 byte operands. To which of the following types of attack is this application susceptible?

A. XML injection
B. Command injection
C. Integer overflow
D. Header manipulation

Answer: B. Command injection

Computer Science & Information Technology

You might also like to view...

The process of preparing for an operating system installation includes verifying that your system has sufficient performance and free disk space for the installation

Indicate whether the statement is true or false

Computer Science & Information Technology

Which one of the following is not a federal regulation concerning use of the police radio?

a. Officers must use the 10 signals. b. Radio must be used for official police business. c. No profanity is permitted. d. No superfluous calls are permitted.

Computer Science & Information Technology