Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
A. Exception handling
B. Adware
C. Cross-site request forgery
D. Cross-site scripting
Answer: D. Cross-site scripting
Computer Science & Information Technology
You might also like to view...
Excel workbooks are identified by tabs at the top of the window
Indicate whether the statement is true or false
Computer Science & Information Technology
A(n) ________ is a workbook that you create to use as a basis for other similar workbooks
Fill in the blank(s) with correct word
Computer Science & Information Technology