首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
The following scenario applies to questions 26 and 27. Charlie is a new security manager at a textile company that develops its
The following scenario applies to questions 26 and 27. Charlie is a new security manager at a textile company that develops its
admin
2013-12-19
27
问题
The following scenario applies to questions 26 and 27.
Charlie is a new security manager at a textile company that develops its own proprietary software for internal business processes. Charlie has been told that the new application his team needs to develop must comply with the ISO/IEC 42010 standard. He has found out that many of the critical applications have been developed in the C programming language and has asked for these applications to be reviewed for a specific class of security vulnerabilities.
Which of the following is Charlie most likely concerned with in this situation?
选项
A、Injection attacks
B、Memory block
C、Buffer overflows
D、Browsing attacks
答案
C
解析
C正确。C编程语言很容易受到缓冲区溢出攻击,因为它的某些命令可以直接进行指针操作。特定的命令可以在不执行边界检查的情况下,直接访问低级别的内存地址。
A不正确。因为C编程语言不比其他语言更容易受到注入攻击。注入攻击通常不是发生在代码级别,而是由于接口接受了没有合理过滤和验证的数据而发生。
B不正确。因为这是一个干扰项。并不存在叫做“内存块”的官方编程语言漏洞。
D不正确。因为当某人审核敏感数据的各种资产时,就会发生浏览攻击。这个与编程语言无关,而是与访问控制的实施方式有关。
转载请注明原文地址:https://www.kaotiyun.com/show/FyhZ777K
0
CISSP认证
相关试题推荐
Theterme-commercereferstoallcommercialtransactionsconductedovertheInternet,includingtransactionsbyconsumersandb
Theterme-commercereferstoallcommercialtransactionsconductedovertheInternet,includingtransactionsbyconsumersandb
Theterme-commercereferstoallcommercialtransactionsconductedovertheInternet,includingtransactionsbyconsumersandb
Nano-sizedtoothbrushesthatcancleanverysmallsurfaceshavebeendevelopedbyresearchers.Fabricatedoutofmillionsofcar
TimeintheAnimalWorldRhythmcontrolseverythinginNature.41Thesunprovidesabasictimerhythmforalllivingcr
Writeanessayof160-200wordsbasedonthefollowingdrawing.Inyouressay,youshould1)describethedrawingbriefly,
DespiteincreasedairportsecuritysinceSeptember11th,2001,thetechnologytoscanbothpassengersandbaggageforweaponsan
Companieshaveembarkedonwhatlookslikethebeginningsofare-runofthemergersandacquisitions(M&A)wavethatdefinedth
In a public-key cryptosystem,(71)encrypted with the public key can only be deciphered with the private key from the same(72). Co
随机试题
对科学管理做出重要贡献的代表人物主要有()
下列有关计算机网络叙述错误的是_____。
YouareheretoseeBillGates,theChairmanandChiefSoftwareArchitectofMicrosoftCorporation.Asyouknow,Microsoftisth
伤寒的主要病变部位在
出院病案排列在最后的是
具有整流特性好,能耐反向电压高,反向电流最小,允许的电流密度最大的整流器是()。
入住期间需要注意的问题有()。
马克思在《资本论》中写道:“美洲金银场地的发现,土著居民被剿灭、被奴役和被埋藏于矿井,对东印度进行的征服和掠夺,非洲变成商业性地猎获黑人的场所:这一切标志着资本主义生产时代的曙光。”在此,马克思要表达的意思是()。
当一个人的外表具有魅力时,他的一些与外表无关的特征也常常被肯定,这种现象被称为()。(2015·浙江)
下列程序的功能是:把s字符串中的所有字母改成该字母的下一个字母,字母z改成字母a。要求大写字母仍为大写字母,小写字母仍为小写字母,其他字符不做改变。请编写函数chg(char*s)实现程序要求,最后调用函数readwriteDAT(),读取in36.dat
最新回复
(
0
)