Which of the following types of attacks are against the software application?

A. Cross-site scripting
B. Spoofing
C. Logic bombs
D. SQL code injections


Answer: A, C, D

Computer Science & Information Technology

You might also like to view...

While building a data warehouse, you are converting dates to months. This second step in the ETL process is known as  ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A runtime exception is a/an:

(a) checked exception (b) unchecked exception (c) offending exception (d) none of the above

Computer Science & Information Technology

Loadable kernel modules are important because ________.

a) they impose a modular structure on the Linux kernel b) they can reduce the kernel’s memory footprint c) they allow modifications to the kernel without recompiling the kernel d) b and c only

Computer Science & Information Technology

(Abstract Base Classes) Suggest one or more levels of abstract base classes for the Shape hi- erarchy discussed in this chapter and shown in Fig. 12.3. (The first level is Shape, and the second level consists of the classes TwoDimensionalShape and ThreeDimensionalShape.)

What will be an ideal response?

Computer Science & Information Technology