CISA Certified Information Systems Auditor – Question1457

Inadequate programming and coding practices introduce the risk of:

A.
phishing.
B. buffer overflow exploitation.
C. SYN flood.
D. brute force attacks.

Correct Answer: B

Explanation:

Explanation:
Buffer overflow exploitation may occur when programs do not check the length of the data that are input into a program. An attacker can send data that exceed the length of a buffer and override part of the program with malicious code. The countermeasure is proper programming and good coding practices. Phishing, SYN flood and brute force attacks happen independently of programming and coding practices.