1.

In which of the following exploits does an attacker insert malicious coding into a link that appears to be from a trustworthy source?

A. Cross-site scripting
B. Command injection
C. Path traversal attack
D. Buffer overflow
Answer» B. Command injection


Discussion

No Comment Found