Which of the following refers to an attacker injecting a client-side script into web pages viewed by other users?

A) Jamming
B) Cross-site scripting
C) WPS attack
D) SQL injection

B) Cross-site scripting

Computer Science & Information Technology

You might also like to view...

Using techniques that ensure the accuracy and consistency of data as it is entered into a table is the ________ principle of good database design

A) first B) second C) third D) fourth

Computer Science & Information Technology

Setting state on a firewall profile allows you to either block connections with configured exceptions or block all connections

Indicate whether the statement is true or false

Computer Science & Information Technology