Sam is a security risk analyst for an insurance company. He is currently examining a scenario where a hacker might use a SQL injection attack to deface a web server due to a missing patch in the company's web application. In this scenario, what is the vulnerability?

A. Unpatched web application
B. Web defacement
C. Hacker
D. Operating system


Answer: A. Unpatched web application

Computer Science & Information Technology

You might also like to view...

Which type of attacks are designed to interrupt or completely disrupt operations of a network device or network communications?

A. Trojan horse attacks B. Dictionary attacks C. DoS attacks D. Worms

Computer Science & Information Technology

I/O addresses are communicated on the address bus.

a. true b. false

Computer Science & Information Technology

To change the contents of the text that appears on the face of a Button object, you must use the Caption property.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You want to create a single chart that shows the proportion of yearly sales for five divisions for each year for five years. Which type of chart can accommodate your needs?

What will be an ideal response?

Computer Science & Information Technology