Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

PECB Certified ISO/IEC 27001 2022 Lead Auditor exam ISO-IEC-27001-Lead-Auditor Question # 103 Topic 11 Discussion

PECB Certified ISO/IEC 27001 2022 Lead Auditor exam ISO-IEC-27001-Lead-Auditor Question # 103 Topic 11 Discussion

ISO-IEC-27001-Lead-Auditor Exam Topic 11 Question 103 Discussion:
Question #: 103
Topic #: 11

Scenario:

A data processing tool crashed when a user added more data to the buffer than its storage capacity allows. The incident was caused by the tool's inability to bound-check arrays. What kind of vulnerability is this?


A.

Intrinsic vulnerability, i.e., inability to bound-check arrays, is a characteristic of the data processing tool


B.

Extrinsic vulnerability, i.e., the exploit of the buffer overflow vulnerability, is caused by an external factor


C.

None; buffer overflow is not a vulnerability; it is a threat


Get Premium ISO-IEC-27001-Lead-Auditor Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.