Multiple Choice
In which of the following exploits does an attacker add SQL code to a Web form input box to gain access to resources or make changes to data?
A) Cross-site scripting
B) Command injection
C) SQL injection
D) Buffer overflow
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q4: Which of the following is NOT recommended
Q5: _ is an electronic or paper log
Q6: This is the name for a group
Q7: This is an assault on the integrity
Q8: A false positive can be defined as…<br>A)An
Q10: This technology is used to measure and
Q11: What is the purpose of a shadow
Q12: Which of the following is characteristic of
Q13: This is a mechanism for ensuring that
Q14: This is an encryption/decryption key known only