Which of the following techniques can be bypass a user or computer's web browser privacy settings? (Choose two.)
A. SQL injection
B. Session hijacking
C. Cross-site scripting
D. Locally shared objects
E. LDAP injection
Answer:
B. Session hijacking
C. Cross-site scripting
Computer Science & Information Technology
You might also like to view...
When configuring the virtual network for a VM in VMware Workstation, which network adapter option should you choose if you want the VM to have an IP address that works on the physical network?
A. bridged B. NAT C. host-only D. custom
Computer Science & Information Technology
What does ATM stand for?
What will be an ideal response?
Computer Science & Information Technology