Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended SQL input that can be passed to a database?

A. Rainbow attack
B. Cross-site request forgery
C. Command injection
D. Buffer overflow


Answer: C

Computer Science & Information Technology

You might also like to view...

An array is not:

a. A consecutive group of memory locations. b. Subscripted by integers. c. Made up of different data types. d. None of the above.

Computer Science & Information Technology

After the header, the body of the method appears inside a set of __________.

a. braces, { } b. parentheses, ( ) c. brackets, [ ] d. double quotes, " "

Computer Science & Information Technology

What is wrong with implementing a queue by using an array, where index 0 represents the front of the queue?

What will be an ideal response?

Computer Science & Information Technology

Describe a client-server based network and provide three examples of common servers used in a Local Area Network (LAN).

What will be an ideal response?

Computer Science & Information Technology