The goal of the ____ attacker is to inject a SQL query/command as an input, possibly via Web pages.
A. phishing
B. XSS
C. SQL injection
D. denial of service
Answer: C
You might also like to view...
The ________ displays the current cell mode, the page number, and the zoom buttons
A) Quick Access Toolbar B) status bar C) Formula Bar D) ribbon
To arrange table data such as 1, 25, 5, and 150, choose the ____ sort type.
A. ascending B. descending C. number D. date
Which of the following network devices could be used to extend the range limitation of Ethernet networks?
A. Load balancer B. Repeater C. IDS D. Firewall
?Case 21-1 Roger has been recently appointed as a team lead in an IT firm. He often needs to make PowerPoint presentations to discuss the team's progress, project related details, etc. Microsoft PowerPoint is used to present data in a crisp manner. Hence, the software allows a user to add images and other graphics to enhance the visual appeal. Roger creates a presentation to represent the growth structure followed in the company that is linked to a central role. He wishes to represent the growth structure in grids. Which of the following type of SmartArt diagrams should Roger use??
A. ?Process B. ?Chart C. ?Matrix D. ?Pyramid