The goal of the ____ attacker is to inject a SQL query/command as an input, possibly via Web pages.

A. phishing
B. XSS
C. SQL injection
D. denial of service

Answer: C

Computer Science & Information Technology

You might also like to view...

The Freeze Top Row option:

A) enables you to adjust settings to control how the worksheet will print. B) is the sequence in which pages print. C) keeps only the top row visible as you scroll through a worksheet. D) defines the range of data to print.

Computer Science & Information Technology

A company has a BYOD policy that includes tablets and smart phones. In the case of a legal investigation, which of the following poses the greatest security issues?

A. Recovering sensitive documents from a device if the owner is unable or unwilling to cooperate B. Making a copy of all of the files on the device and hashing them after the owner has provided the PIN C. Using GPS services to locate the device owner suspected in the investigation D. Wiping the device from a remote location should it be identified as a risk in the investigation

Computer Science & Information Technology