____________ will let you assume a users identity at a dynamically generated web page or site.
A.
SQL attack
B.
Injection attack
C.
Cross site scripting
D.
The shell attack
E.
Winzapper
____________ will let you assume a users identity at a dynamically generated web page or site.
____________ will let you assume a users identity at a dynamically generated web page or site.
A.
SQL attack
B.
Injection attack
C.
Cross site scripting
D.
The shell attack
E.
Winzapper