What type of attack occurs when an attacker can bypass the application's security mechanism to access the application's resources?

A. SQL Code injection
B. Time bomb
C. Back door
D. Cross site scripting


Answer: C

Computer Science & Information Technology

You might also like to view...

_____ is the use of software to analyze the robustness and performance of components and assemblies.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In a table, a characteristic of the data is called ________

A) field B) record C) topic D) area

Computer Science & Information Technology

Home and small business users purchase ______ T1 lines, in which they share a connection with others.

A. multiuser B. fractional C. split D. divided

Computer Science & Information Technology

?With XQuery, the user can summarize data with aggregate functions.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology