In a(n) ________ attack, the user enters part of a database query instead of giving the expected input.

A. buffer overflow
B. login screen bypass
C. XSS
D. SQL injection


D. SQL injection

Computer Science & Information Technology

You might also like to view...

Google Buzz was a social medium intended to create a "buzz" of email conversations and other communications

Indicate whether the statement is true or false

Computer Science & Information Technology

If an error is made while recording a narration, click the ________ button, to rerecord the narration for the current slide

A) Redo B) Rewind C) Repeat D) Undo

Computer Science & Information Technology

An online cloud computing technology that offers collaborative storage space that is integrated with Office 2013 is ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____________________ tag allows you to define a set of rectangular areas on your browser screen called frames.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology