Multiple Choice
An application developer has neglected to include input validation checks in the design of the company's new web application. An employee discovers that repeatedly submitting large amounts of data, including custom code, to an application will allow the execution of the custom code at the administrator level. Which of the following BEST identifies this application attack?
A) Cross-site scripting
B) Clickjacking
C) Buffer overflow
D) Replay
Correct Answer:

Verified
Correct Answer:
Verified
Q23: Which of the following technologies employ the
Q24: A security analyst monitors the syslog server
Q25: A security analyst is running a credential-based
Q26: A company is examining possible locations for
Q27: To determine the ALE of a particular
Q29: An organization wishes to allow its users
Q30: A security analyst receives an alert from
Q31: A system administrator needs to implement 802.1x
Q32: A company network is currently under attack.
Q33: A security analyst discovers that a company's