search
Log In
1 vote
192 views
Suppose a source code has bigger overflow vulnerabilities. Which of the following  can cause buffer overflow vulnerabilities

a.  Scanf("%s",...)

b.  Strcpy(destination, source)

c.  Send command  use for network  connection

Options are

1. Only a

2. b and c

3. a and b

4. All of the above
in Operating System 192 views

Please log in or register to answer this question.

Related questions

0 votes
1 answer
1
169 views
1. What is the difference between message integrity and message authentication ? I have read in frozen : message integrity -: message digest (generated by applying hash function on message ) is being added with original message and by verification of this digest(creating the ... are verifying digest in both for assurance of not modified data. Explain it pls. I m not able to visualise it . Thanks
asked Jun 15, 2017 in Computer Networks bharti 169 views
0 votes
1 answer
2
1.6k views
Q6. ___________Data Encryption Standard (DES) was designed to increase the size of the Data Encryption Standard (DES) key. (A) Double (B) Triple (C) Quadruple (D) none of these
asked Feb 3, 2017 in Computer Networks Dulqar 1.6k views
0 votes
2 answers
3
334 views
Q3: What kind of ciphers Electronic Codebook (ECB) mode and Cipher Block Chaining (CBC) mode are (A) Block cipher (B) Stream cipher (C) Field cipher (D) both (A) and (B)
asked Feb 3, 2017 in Computer Networks Dulqar 334 views
1 vote
0 answers
4
192 views asked May 9, 2019 in Operating System Hirak 192 views
...