Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended SQL input that can be passed to a database?
A. Rainbow attack
B. Cross-site request forgery
C. Command injection
D. Buffer overflow
Answer: C
Computer Science & Information Technology
You might also like to view...
Describe three security policy decisions that can be implemented to prevent departmental bandwidth consumption that compromises network operations.
What will be an ideal response?
Computer Science & Information Technology
Many different types of information systems are described in this subject. Briefly describe any FIVE (5) systems that might be used by university.
What will be an ideal response?
Computer Science & Information Technology