In which of the following attack types does an attacker modify the content of a web page by examining its HTML code and identifying form fields that lack valid constraints?
A. Directory traversal
B. Buffer overflow attack
C. Command injection attack
D. Cross-site scripting (XSS) attack
Answer: C. Command injection attack
You might also like to view...
Government agencies have a long history of surveillance of people in the United States in order to control political dissent
a. true b. false
Gale works as an attorney twelve hours a day, six days a week. She is good at what she does, and as a result now owns a $500,000 house in the suburbs. According to Merton's typology, Gale would be classified as:
a. a conformist b. an innovator c. an overachiever d. a ritualist
Some store owners were reluctant to hire _______ in sales jobs for fear that potential customers would dislike the new sales workers
a. minority group members b. college graduates c. unmarried men d. high school drop-outs e. middle-aged women
According to West and Zimmerman, gender is
A. a fixed identity B. something most people ignore C. biological D. something we do