Which of the following BEST identifies this application attack?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

An application developer has neglected to include input validation checks in the design of the company’s new web application. An employee discovers that repeatedly submitting large amounts of data, including custom code, to an application will allow the execution of the custom code at the administrator level.

Which of the following BEST identifies this application attack?
A . Cross-site scripting
B . Clickjacking
C . Buffer overflow
D . Replay

Answer: C

Leave a Reply

Your email address will not be published.