A type of attack that embeds JavaScript functions into HTML data elements so that pages can be redirects to other Web sites without the user knowing.

A. Buffer overflows
B. SQL code injection
C. Back door
D. Cross-site scripting


Answer: D

Computer Science & Information Technology

You might also like to view...

_____ is IBM's first 64-bit enterprise operating system that is capable of handling very heavy workloads.

A. Mac OS X B. Unix C. Chrome D. z/OS

Computer Science & Information Technology

The SNMP database is referred to as the ________

A) Collector B) Sampler C) MIB D) AD

Computer Science & Information Technology

What are the three primary logical topologies? Briefly describe each one.

What will be an ideal response?

Computer Science & Information Technology

Since a page designer doesn't know the exact properties of a user's device, the common practice is to make the text _________ with all font sizes expressed relative to a default font size.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology