Identify the attack from following sequence of actions? Step 1: A user logs in to a trusted site and
creates a new session. Step 2: The trusted site stores a session identifier for the session in a cookie in
the web browser. Step 3: The user is tricked to visit a malicious site. Step 4: the malicious site sends a
request from the user’s browser using his session cookie.
A.
Cross-Site Request Forgery (CSRF) Attack
B.
Hidden Field Manipulation Attack
C.
Cross-Site Scripting (XSS) Attacks
D.
Web Application Denial-of-Service (DoS) Attack