A _______ attack is where the input includes code that is then executed by the attacked system.
A. SQL injection B. cross-site scripting
C. code injection D. interpreter injection
C. code injection
Computer Science & Information Technology
You might also like to view...
Network documentation includes end-device capabilities, memory, peripherals, operating sys tem, and address. Why is a host device's information critical to network documentation?
What will be an ideal response?
Computer Science & Information Technology
FAT32 File system is recommended in Windows environment because it offers built in file system level security
a. true b. false
Computer Science & Information Technology