Which of the following techniques can be bypass a user or computer's web browser privacy settings? (Choose two.)

A. SQL injection
B. Session hijacking
C. Cross-site scripting
D. Locally shared objects
E. LDAP injection

Answer:
B. Session hijacking
C. Cross-site scripting

Computer Science & Information Technology

You might also like to view...

When configuring the virtual network for a VM in VMware Workstation, which network adapter option should you choose if you want the VM to have an IP address that works on the physical network?

A. bridged B. NAT C. host-only D. custom

Computer Science & Information Technology

What does ATM stand for?

What will be an ideal response?

Computer Science & Information Technology