Pete, the security administrator, has been notified by the IDS that the company website is under
attack. Analysis of the web logs show the following string, indicating a user is trying to post a
comment on the public bulletin board.
INSERT INTO message ‘<script>source=http://evilsite</script>
This is an example of which of the following?
A.
XSS attack
B.
XML injection attack
C.
Buffer overflow attack
D.
SQL injection attack