A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.

A. command injection B. SQL injection

C. code injection D. PHP remote code injection

A. command injection

Computer Science & Information Technology

You might also like to view...

When previewing a presentation, the ________ icon displays a navigational list for moving between slides

A) Navigation B) Next C) Menu D) Slide Show

Computer Science & Information Technology

By using the ________ tool, you can match colors used in a slide other slides

Fill in the blank(s) with correct word

Computer Science & Information Technology