Attempting to inject 50 alphanumeric key strokes including spaces into an application input field that only expects four alpha characters in considered which of the following attacks?
A. XML injection
B. Buffer overflow
C. LDAP Injection
D. SQL injection
Answer: D. SQL injection
Computer Science & Information Technology
You might also like to view...
Answer the following statements true (T) or false (F)
1. A Shared method may access Shared and non-Shared members. 2. To access a Private Shared class member when no objects of the class exist, a Public Shared method or property must be provided. 3. A Shared method has a Me reference. 4. Shared class members are available only after the first object of that class is created
Computer Science & Information Technology
?Office Mix is a __________
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology