Question: 10. A developer has incorporated routine into the source code for controlling the length of the input passed to the program. Which of the following
10. A developer has incorporated routine into the source code for controlling the length of the input passed to the program. Which of the following types of vulnerabilities is the developer protecting the code against?
A. DLL injection
B. Memory leak
C. Buffer overflow
D. Pointer dereference
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
