Posted by: Pdfprep
Post Date: July 5, 2021
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows.
What action would allow the attacker to gain access to machine 1 but not machine 2?
A . sniffing the packets between the two hosts
B . overflowing the buffer’s memory
C . sending continuous pings
D . inserting malicious commands into the database
Answer: D
Leave a Reply