Which web attack is possible due to a lack of input validation?

A. Extraneous files
B. Clickjacking
C. SQL injection
D. Cross-site request forgery

Answer: C. SQL injection

Computer Science & Information Technology

You might also like to view...

When a links source consists of a URL, it can be assumed that the link is a(n):

A) internal link. B) primary link. C) external link. D) offsite link.

Computer Science & Information Technology

Folders are containers that store Outlook items of a specific type, such as messages, appointments, contacts.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology