Which of the following attacks takes advantage of user …

Which of the following attacks takes advantage of user provided input to inject executable binary code into a running program?

Which of the following attacks takes advantage of user provided input to inject executable binary code into a running program?

A.
SQL injection

B.
Session hijacking

C.
Heder manipulation

D.
Buffer overflow



Leave a Reply 0

Your email address will not be published. Required fields are marked *

1 + one =