

MCQOPTIONS
Saved Bookmarks
1. |
In which of the following exploits does an attacker insert malicious coding into a link that appears to be from a trustworthy source? |
A. | Cross-site scripting |
B. | Command injection |
C. | Path traversal attack |
D. | Buffer overflow |
Answer» B. Command injection | |