1.

In which of the following exploits does an attacker add SQL code to a Web form inputbox to gain access to resources or make changes to data?

A. Cross-site scripting
B. Command injection
C. SQL injection
D. Buffer overflow
Answer» D. Buffer overflow


Discussion

No Comment Found