Which of the following occurs when an attacker locates a web site vulnerability, thereby allowing the attacker to inject malicious code into the Web application?

A. XSS
B. insecure direct object references
C. memory leaks
D. CSRF

A
Explanation: Cross-site scripting (XSS) occurs when an attacker locates a web site vulnerability, thereby allowing the attacker to inject malicious code into the Web application. Many web sites allow and even incorporate user input into the web page to customize the web page. If the web application does not properly validate this input, one of two things could happen. Either the text will be rendered on the page or a script may be executed when others visit the web page.

Computer Science & Information Technology

You might also like to view...

A drop cap can be formatted as text even though it is treated as a ________

A) anchor B) floating graphic C) table D) leader character

Computer Science & Information Technology

A programmer has allocated a 32 bit variable to store the results of an operation between two user supplied 4 byte operands. To which of the following types of attack is this application susceptible?

A. XML injection B. Command injection C. Integer overflow D. Header manipulation

Computer Science & Information Technology