Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-38 All Questions

View all questions & answers for the 312-38 exam

Exam 312-38 topic 1 question 1 discussion

Actual exam question from ECCouncil's 312-38
Question #: 1
Topic #: 1
[All 312-38 Questions]

John works as a C programmer. He develops the following C program:

His program is vulnerable to a __________ attack.

  • A. SQL injection
  • B. Denial-of-Service
  • C. Buffer overflow
  • D. Cross site scripting
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️
This program takes a user-supplied string and copies it into 'buffer1', which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow.

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
[Removed]
2 months, 4 weeks ago
Selected Answer: C
John's program is vulnerable to a Buffer overflow attack. Correct answer: C. Buffer overflow
upvoted 1 times
...
user20180420
3 years ago
answer c
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...