Notifications
Clear all
Topic starter
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows.
What action would allow the attacker to gain access to machine 1 but not machine 2?
- A . sniffing the packets between the two hosts
B. sending continuous pings
C. overflowing the buffer’s memory
D. inserting malicious commands into the database
Suggested Answer: D
Posted : 26/11/2022 11:28 pm