During the analysis of malicious code, a security analyst discovers JavaScript being used to send
random data to another service on the same system. This is MOST likely an example of which of
the following?
A.
Buffer overflow
B.
XML injection
C.
SQL injection
D.
Distributed denial of service
Explanation: