which of the following?

Pete, the security administrator, has been notified by the IDS that the company website is under
attack. Analysis of the web logs show the following string, indicating a user is trying to post a
comment on the public bulletin board.
INSERT INTO message ‘<script>source=http://evilsite</script>
This is an example of which of the following?

Pete, the security administrator, has been notified by the IDS that the company website is under
attack. Analysis of the web logs show the following string, indicating a user is trying to post a
comment on the public bulletin board.
INSERT INTO message ‘<script>source=http://evilsite</script>
This is an example of which of the following?

A.
XSS attack

B.
XML injection attack

C.
Buffer overflow attack

D.
SQL injection attack



Leave a Reply 0

Your email address will not be published. Required fields are marked *