A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.
A. command injection B. SQL injection
C. code injection D. PHP remote code injection
A. command injection
Computer Science & Information Technology
You might also like to view...
When previewing a presentation, the ________ icon displays a navigational list for moving between slides
A) Navigation B) Next C) Menu D) Slide Show
Computer Science & Information Technology
By using the ________ tool, you can match colors used in a slide other slides
Fill in the blank(s) with correct word
Computer Science & Information Technology