Which of the following is a type of attack that allows for untrusted data to be executed as a valid command?

a. Injection flaw attack
b. Parameter/form tampering attack
c. Invalidated input attack
d. Hidden fields attack

ANS: A

Computer Science & Information Technology

You might also like to view...

If an Access table is linked to data in another file, you can:

A) delete records from the table. B) change records in the table. C) add new records to the table. D) do none of the above.

Computer Science & Information Technology

What key combination can be used to run a program without debugging it?

A. Alt + F4 B. Ctrl + F5 C. Ctrl + R D. Shift + Ctrl + 1

Computer Science & Information Technology