Buffer overflows, format string vulnerabilities, and utilization of shell-escape codes can be mitigated by which of the following practices?

Buffer overflows, format string vulnerabilities, and utilization of shell-escape codes can be mitigated by which of the following practices?




a. Fuzzing
b. Testing
c. Input validation
d. Browser initiated token request




Answer: C


Learn More :

Network Security

Learn More Multiple Choice Question :