Which of the following is a type of attack that allows for untrusted data to be executed as a valid command?
a. Injection flaw attack
b. Parameter/form tampering attack
c. Invalidated input attack
d. Hidden fields attack
ANS: A
Computer Science & Information Technology
You might also like to view...
If an Access table is linked to data in another file, you can:
A) delete records from the table. B) change records in the table. C) add new records to the table. D) do none of the above.
Computer Science & Information Technology
What key combination can be used to run a program without debugging it?
A. Alt + F4 B. Ctrl + F5 C. Ctrl + R D. Shift + Ctrl + 1
Computer Science & Information Technology