Which of the following occurs when an attacker locates a web site vulnerability, thereby allowing the attacker to inject malicious code into the Web application?
A. XSS
B. insecure direct object references
C. memory leaks
D. CSRF
A
Explanation: Cross-site scripting (XSS) occurs when an attacker locates a web site vulnerability, thereby allowing the attacker to inject malicious code into the Web application. Many web sites allow and even incorporate user input into the web page to customize the web page. If the web application does not properly validate this input, one of two things could happen. Either the text will be rendered on the page or a script may be executed when others visit the web page.
You might also like to view...
If a chart is inserted on the same worksheet where the data lives, it is ________ on the worksheet
A) embedded B) a chart sheet C) wrapped D) integrated
An authenticated user can add up to how many computer accounts to the domain, by default?
A. 1 B. 5 C. 10 D. 15
The open-source descendant of Nessus is called which of the following?
A. NW B. WNessus C. OpenVAS D. WinNessus
Images that will be printed need a resolution of at least 300 ppi (pixels per inch) or dpi (dots per inch) but images viewed only on the web need a minimum resolution of _______________ ppi.
Fill in the blank(s) with the appropriate word(s).