Attempting to inject 50 alphanumeric key strokes including spaces into an application input field that only expects four alpha characters in considered which of the following attacks?

A. XML injection
B. Buffer overflow
C. LDAP Injection
D. SQL injection


Answer: D. SQL injection

Computer Science & Information Technology

You might also like to view...

Electronic stationery is used in ____.

a. Web mail systems b. messaging systems c. electronic greeting cards d. mobile phone games

Computer Science & Information Technology

What is the advantage of prefetching images for an animation?

What will be an ideal response?

Computer Science & Information Technology

Describe ICA.

What will be an ideal response?

Computer Science & Information Technology

Which of the following terms refers to any application that combines text with graphics, animation, audio, video, and/or virtual reality?

A. portal B. web app C. multimedia D. Java applet

Computer Science & Information Technology