Which of the following refers to an attacker injecting a client-side script into web pages viewed by other users?
A) Jamming
B) Cross-site scripting
C) WPS attack
D) SQL injection
B) Cross-site scripting
Computer Science & Information Technology
You might also like to view...
Using techniques that ensure the accuracy and consistency of data as it is entered into a table is the ________ principle of good database design
A) first B) second C) third D) fourth
Computer Science & Information Technology
Setting state on a firewall profile allows you to either block connections with configured exceptions or block all connections
Indicate whether the statement is true or false
Computer Science & Information Technology