Poor programming techniques and lack of code review can lead to which of the following types of
attack?
A.
Buffer overflow
B.
Dictionary
C.
Common Gateway Interface (CGI) script
D.
Birthday
Explanation:
Buffer overflows occur when an application receives more data than it is programmed to accept.
This situation can cause an application to terminate. The termination may leave the system
sending the data with temporary access to privileged levels in the attacked system. This
exploitation is usually a result of a programming error in the development of the software.
Reference:
Mike Pastore and Emmett Dulaney , Security+ Study Guide , 2nd Edition, Alameda , Sybex , 2004,
p 135