Multiple Choice
Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called
A) a Trojan horse.
B) an SQL injection attack.
C) key logging.
D) a DDoS attack.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q19: How is the security of a firm's
Q20: Zero defects cannot be achieved in larger
Q46: You have just been hired as a
Q51: _ is a crime in which an
Q52: Smaller firms may outsource some or many
Q54: Approximately how many new threats from malware
Q55: Hackers create a botnet by<br>A) infecting Web
Q57: In controlling network traffic to minimize slow-downs,
Q59: Electronic data are more susceptible to destruction,
Q84: Rigorous password systems<br>A)are one of the most