Multiple Choice
A cross-site scripting vulnerability can occur when
A) Files are accepted as input without verifying their specifications
B) Input from other users is supplied as output to other users
C) A program puts more data into a storage location than it can hold
D) User input is used without confirming its validity
Correct Answer:

Verified
Correct Answer:
Verified
Q4: Malware refers to<br>A) Programs that propagate through
Q5: Denial of service refers to<br>A) Programs that
Q6: Zombies are<br>A) Software used to hide the
Q7: Assets are<br>A) Resources or information that is
Q8: The NVD database<br>A) Describes likely impacts and
Q10: Physical controls<br>A) Use non-technical methods of preventing
Q11: Threats are<br>A) Safeguards used to minimize the
Q12: Controls are<br>A) Safeguards used to minimize the
Q13: Rootkits are<br>A) Software used to hide the
Q14: Zero-day exploits are<br>A) Software used to hide