In which of the following attack types does an attacker modify the content of a web page by examining its HTML code and identifying form fields that lack valid constraints?

A. Directory traversal
B. Buffer overflow attack
C. Command injection attack
D. Cross-site scripting (XSS) attack


Answer: C. Command injection attack

Sociology

You might also like to view...

Government agencies have a long history of surveillance of people in the United States in order to control political dissent

a. true b. false

Sociology

Gale works as an attorney twelve hours a day, six days a week. She is good at what she does, and as a result now owns a $500,000 house in the suburbs. According to Merton's typology, Gale would be classified as:

a. a conformist b. an innovator c. an overachiever d. a ritualist

Sociology

Some store owners were reluctant to hire _______ in sales jobs for fear that potential customers would dislike the new sales workers

a. minority group members b. college graduates c. unmarried men d. high school drop-outs e. middle-aged women

Sociology

According to West and Zimmerman, gender is

A. a fixed identity B. something most people ignore C. biological D. something we do

Sociology