Which of the following types of attack works by taking advantage of the unenforced and uncheckedassumptions the system makes about its inputs?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
format string vulnerabilities
B.
integer overflow
C.
code injection
D.
command injection
E.
None of the choices.
Explanation:
Code injection is a technique to introduce code into a computer program or system by taking advantage of the
unenforced and unchecked assumptions the system makes about its inputs.