Attempting to inject 50 alphanumeric key strokes including spaces into an application input field that only expects four alpha characters in considered which of the following attacks?
A. XML injection
B. Buffer overflow
C. LDAP Injection
D. SQL injection
Answer: D. SQL injection
Computer Science & Information Technology
You might also like to view...
Electronic stationery is used in ____.
a. Web mail systems b. messaging systems c. electronic greeting cards d. mobile phone games
Computer Science & Information Technology
What is the advantage of prefetching images for an animation?
What will be an ideal response?
Computer Science & Information Technology
Describe ICA.
What will be an ideal response?
Computer Science & Information Technology
Which of the following terms refers to any application that combines text with graphics, animation, audio, video, and/or virtual reality?
A. portal B. web app C. multimedia D. Java applet
Computer Science & Information Technology