A security engineer is testing a web application for vulnerabilities and has inserted the following characters into a form field: “script OR name LIKE %user%;.” The security engineer is performing:

a. Buffer overflow
b. Cross-site scripting
c. SQL injection
d. Script injection


c. SQL injection

Computer Science & Information Technology

You might also like to view...

The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices.

A. 32-bit B. 64-bit C. 128-bit D. 256-bit

Computer Science & Information Technology

An unusual advertisement on your computer screen that pops up is usually caused by ________

A) adware or spyware B) a Trojan horse C) keystroke loggers D) antivirus software

Computer Science & Information Technology

Brian F. O’Byrne (“F,” he says, stands for “frozen.”) owns a frozen food company and wants to develop an information system for tracking shipments to warehouses

a. Using the data from the table in Figure 3.E X 1, draw a Gantt chart to help Brian organize his design project. b. When is it appropriate to use a Gantt chart? What are the disadvantages? Explain in a paragraph.

Computer Science & Information Technology

Which of the following descriptive statistics measures how scattered the values in a set of numbers are from an expected value?

A. Standard Deviation B. Sample Variance C. Median D. Mode

Computer Science & Information Technology