Solved

In Which of the Following Does a Threat Actor Take

Question 2

Multiple Choice

In which of the following does a threat actor take advantage of web applications that accept user input without validating it before presenting it back to the user?


A) Session hijacking
B) Man-in-the-middle attack
C) Cross-site scripting
D) Privilege escalation

Correct Answer:

verifed

Verified

Related Questions