From the listing of attack types, which exploits poor programming techniques or lack of code
review?
A.
CGI (Common Gateway Interface) scripts
B.
Birthday attacks
C.
Buffer overflow attacks
D.
Dictionary attacks
Explanation:
Buffer overflows occur when an application receives more data than it is programmed to accept.
This situation can cause an application to terminate. The termination may leave the system
sending the data with temporary access to privileged levels in the attacked system. This
exploitation is usually a result of a programming error in the development of the software.
Reference:
Mike Pastore and Emmett Dulaney , Security+ Study Guide , 2nd Edition, Alameda , Sybex , 2004,
p 135