The attack method used in the Sony data breaches was ________

A) Cross-site scripting
B) SQL injection
C) Denial of service
D) None of the above

Answer: B

Business

You might also like to view...

The type of pre-trial motion that must be supported by specific evidence is a motion for:

A) Judgment on the pleadings. B) Judgment notwithstanding the verdict. C) Summary judgment. D) Appeal.

Business

Gantt charts can be used to:

A) monitor the progress of jobs but cannot be used to sequence work on each machine. B) sequence work on each machine but cannot be used to monitor the progress of each job. C) monitor the progress of jobs and sequence work on each machine. D) monitor the average number of defective parts generated by a machine on each job.

Business