which exploits poor programming techniques or lack of code review?

From the listing of attack types, which exploits poor programming techniques or lack of code
review?

From the listing of attack types, which exploits poor programming techniques or lack of code
review?

A.
CGI (Common Gateway Interface) scripts

B.
Birthday attacks

C.
Buffer overflow attacks

D.
Dictionary attacks

Explanation:

Buffer overflows occur when an application receives more data than it is programmed to accept.
This situation can cause an application to terminate. The termination may leave the system
sending the data with temporary access to privileged levels in the attacked system. This
exploitation is usually a result of a programming error in the development of the software.
Reference:
Mike Pastore and Emmett Dulaney , Security+ Study Guide , 2nd Edition, Alameda , Sybex , 2004,
p 135



Leave a Reply 0

Your email address will not be published. Required fields are marked *