Which web attack is possible due to a lack of input validation?
A. Extraneous files
B. Clickjacking
C. SQL injection
D. Cross-site request forgery
Answer: C. SQL injection
Computer Science & Information Technology
You might also like to view...
When a links source consists of a URL, it can be assumed that the link is a(n):
A) internal link. B) primary link. C) external link. D) offsite link.
Computer Science & Information Technology
Folders are containers that store Outlook items of a specific type, such as messages, appointments, contacts.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology