nerdexam
EC-CouncilEC-Council

312-49 · Question #253

312-49 Question #253: Real Exam Question with Answer & Explanation

Sign in or unlock 312-49 to reveal the answer and full explanation for question #253. The question stem and answer options stay visible for context.

Submitted by devops_kid· Apr 18, 2026Malware Forensics

Question

Kyle is performing the final testing of an application he developed for the accounting department. His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point? #include #include int main(int argc, char *argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s string\n", argv[0]); return 1; } strcpy(buffer, argv[1]); return 0; }

Options

  • ASQL injection
  • BFormat string bug
  • CBuffer overflow
  • DKernal injection

Unlock 312-49 to see the answer

You've previewed enough free 312-49 questions. Unlock 312-49 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Buffer Overflow#Vulnerability Assessment#C Programming#Memory Safety
Full 312-49 PracticeBrowse All 312-49 Questions