1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novay_Z [31]
3 years ago
15

The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________

Computers and Technology
1 answer:
SashulF [63]3 years ago
8 0

Answer:

A. Arbitrary code execution

Explanation:

A buffer-overrun, also known as buffer overflow occurs when a programmer makes an error during coding, which could make his system easily susceptible to attacks from a hacker. The root cause of this problem is an overflow of data in a buffer, and programs that are written in C and C+ + are more likely to be affected by this problem.  When a buffer-overrun occurs, it would most likely lead to arbitrary code execution.

Arbitrary code execution is an uncontrolled and unrestricted coding by the attacker which alters the original coding. The attacker could input more information into the coding, which alters the original information and which would make the application porous and accessible by just anyone. It is important that programmers run regular tests on their programs, so as to detect any coding errors.

You might be interested in
Which for loop syntax is correct?
Ugo [173]

Answer:

C

Explanation:

3 0
2 years ago
The ping command uses the most basic interior routing protocol on the internet which is the:
Nesterboy [21]
Routing Information Protocol (RIP)
5 0
3 years ago
Two programmers wrote very similar code. Compare the two to decide what the difference will be between them. Programmer A draws
Verdich [7]

Answer:

The differences will be the shapes drawn

Explanation:

7 0
3 years ago
Read 2 more answers
Write a console-based employee management system through binary File Handling (In order to observe data security, we use binary
dangina [55]

Answer:

#include <fstream>

#include <iostream>

#define FILE_N "employee.dat"

using namespace std;

class Employee {

private :  

int  empID;

char  empName[100] ;

int  salary;

public  :

void readEmployeeDetails(){

 cout<<" PLEASE SUBMIT EMPLOYEE DETAILS"<<endl;

 cout<<"INPUT EMPLOYEE ID : " ;

 cin>>empID;

 cin.ignore(1);

 cout<<"ENTER EMPLOYEE NAME: ";

 cin.getline(empName,100);

 cout<<"ENTER EMPLOYEE SALARY : ";

 cin>>salary;

}

void increasesalary(){

 cout<<" Increment Salary"<<endl;

 cout<<"ENTER INCREMENT SALARY : ";

 int sal;

 cin>>sal;

 salary=salary + sal;

}

void displayEmployee(){

 cout<<"EMP ID: "<<empID<<endl

  <<"EMP NAME: "<<empName<<endl

  <<"SALARY: "<<salary<<endl;

}

};

int main(){

   int options;

   

LOOP:cout<<"Enter the Options:";

   cin>>options;

if(options == 1)

{

Employee emp;

emp.readEmployeeDetails();

fstream file;

file.open(FILE_N,ios::out|ios::binary);

if(!file){

 cout<<"There is an Error found while creating file...\n";

 return -1;

}

 

file.write((char*)&emp,sizeof(emp));

file.close();

cout<<"Date has been saved in the file.\n";

goto LOOP;

}

else if(options == 2)

{

Employee emp;    

fstream file;

file.open(FILE_N,ios::in|ios::binary);

if(!file){

 cout<<"There is an error while opening file...\n";

 return -1;

}

 

if(file.read((char*)&emp,sizeof(emp))){

  cout<<endl<<endl;

  cout<<"Data being discovered from the file..\n";

  emp.displayEmployee();

}

else{

 cout<<"There is an error while reading the file...\n";

 return -1;

}

goto LOOP;

}

else

{

  Employee emp;

emp.increasesalary();

fstream file;

file.open(FILE_N,ios::out|ios::binary);

if(!file){

 cout<<"Error found while creating file...\n";

 return -1;

}

 

file.write((char*)&emp,sizeof(emp));

file.close();

cout<<"Date saved inside the file.\n";

goto LOOP;

}

return 0;

}

Explanation:

The above program is in C++. It creates a class, assign it value, and then work on three option.

1. Press 1 to ADD AN EMPLOYEE.

2. Press 2 to DISPLAY FILE DATA.

3. Press 3 to INCREASE EMPLOYEE SALARY.

Rest is as shown in program.

8 0
4 years ago
In the traditional routing model, as opposed to SDN, a router uses the packet's __________ to forward the packet. Group of answe
bixtya [17]

Answer:

A. destination address

Explanation:

To communicate we ususally make use of web browsers or some applications that is application layer. We write some message there. This message is encrypted by application layer for safety that is previously done by presentation layer . Transport layer make communication possible between these two process.

The data link layer is the next place the message gets to before proceeding to the actual ip or destination address.

3 0
3 years ago
Other questions:
  • âwhen the footer is the last element in a page body, the _____ pseudo-element is used to add a placeholder element after the foo
    8·2 answers
  • If the pc-doctor software is installed on a computer's hard drive, what two different ways can the program be started?
    9·1 answer
  • Answer the following Python Interview questions • How is Python an interpreted language? • What is the difference between Python
    10·1 answer
  • Katherine wants to open a bank account that allowed her to perform frequent transactions without being charged a penalty and she
    14·1 answer
  • Difference between multidimensional arrays and an example​
    5·1 answer
  • What is the difference between ionizing and non-ionizing radiation?
    7·2 answers
  • Ummm, I hate to interrupt your day, but does anyone know where Mitch72 is????? Because he hasn't talked in a week, and he hasn't
    7·1 answer
  • Write a program that reads in ten numbers from the user and displays the distinct numbers. If a number entered by the user appea
    13·1 answer
  • Does the following code return a string or a number def of() return 3
    12·1 answer
  • If a flagged word is spelled correctly, such as many of our names, right-click it and then click ____ on the shortcut menu to in
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!