1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
2 years ago
15

While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter

ed is so large that it exceeds the maximum value supported by the variable type used to store the quantity in the web application. This causes the value of the quantity variable to wrap around to the minimum possible value, which is a negative number. As a result, the web application processes the order as a return instead of a purchase, and the attacker's account is credited with a large sum of money. Which practices would have prevented this exploit
Computers and Technology
1 answer:
Darina [25.2K]2 years ago
4 0

Answer:

Implementing client side validation

Explanation:

Given that this type of attack is known as Integer Overflow, the best means or practices to prevent this kind of attack is " implementing client-side validation."

This is because implementing client-side validation assists to prevent the validation errors that will arise from the integer overflow thereby resulting in a reduction of the network and server load.

Hence, in this case, the correct answer is "Implementing the client-side validation."

You might be interested in
______ is a customer-facing CRM application.<br><br> FAQ<br><br> Search<br><br> SFA<br><br> E-mail
Stolb23 [73]

Answer: SFA(Sales force automation)

Explanation: SFA(Sales force automation) is the customer relationship management application for the establishing the relation with the customer point of view.

It is in the integrated form of application that works on the customer side along with the tools of the CRM. Sales force management system is also one of the name for the sales force automation.

5 0
2 years ago
8.1.4: Ghost Invasion!
Natalija [7]

the fat car has a lot to pass on PC Dell is the only thing to

8 0
2 years ago
Which directory in the FHS stores programs and configuration information that can only be executed and modified by the root user
dlinn [17]

Answer: /sbin

Explanation:

In Linux, FHS describes the directory content and the way in which Operating System files are displayed to the user.

/sbin is a directory that contains executable programs. s/bin is the short form of system binaries. System binaries require root rights to perform specific tasks. /sbin contains binaries that are crucial to boot the system and also to recover and restore the system. /bin directory also contains the commands to boot the system but the main difference between both is that /sbin programs can only be executed by the root user. Examples are fdisk, fsck, root,halt, init, grub, ifconfig.

4 0
3 years ago
Complete the sentence.
mamaluj [8]

Answer:

We need context, it could be several answers

Explanation:

4 0
3 years ago
Write a c program to count the total number of commented characters and words in a c file taking both types of c file comments (
Tanzania [10]

#include<stdio.h>

#include<stdlib.h>

int comment1(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\n')

       {

           return count;

       }

       count++;

   }

   return count;

}

int comment2(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='*')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               return count;

           }

           count++;

       }

       count++;

   }

   return 0;

}

int main()

{

   printf("Enter the file name:");

   char s[1000],ch,ch1;

   scanf("%s",s);

   FILE*fp;

   fp = fopen(s,"r");

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\"')

       {

           while(fscanf(fp,"%c",&ch)!=EOF)

           {

               if(ch=='\"')

               {

                   break;

               }

               if(ch=='\\')

               {

                   fscanf(fp,"%c",&ch);

               }

           }

       }

       else if(ch=='/')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               count += comment1(fp);

           }

           else if(ch=='*')

           {

               count += comment2(fp);

           }

       }

   }

   printf("%d\n",count);

   return 0;    

}

3 0
2 years ago
Read 2 more answers
Other questions:
  • Stefan is finalizing his presentation by adding media files and preparing it for distribution. Stefan knows that saving a presen
    13·1 answer
  • The ____ dialog box in windows vista appears each time a user attempts to perform an action that can be done only with administr
    12·1 answer
  • Computers store temporary Internet files in the Recycle Bin. These files take up space and slow down a computer. Which tool can
    10·1 answer
  • How did the invention of the printing press lead eventually to an increase in the diversity of religious expression?
    7·1 answer
  • Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
    11·1 answer
  • Tweaking existing technology in a new way is usually called _____. leveraged creativity state-of-the-art breakthrough applicatio
    5·1 answer
  • A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
    12·1 answer
  • Im boing exam help please In a category-based course grading system, teachers weigh a student's performance in all courses. all
    7·2 answers
  • Which of the following IS an operating system? *<br> Reddit<br> Ubuntu<br> Office 365<br> Mac Pro
    9·1 answer
  • Question 1
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!