____________ will let you assume a users identity at a dynamically generated web page or site.
A.
SQL attack
B.
Injection attack
C.
Cross site scripting
D.
The shell attack
E.
Winzapper
Explanation:
Cross site scripting is also referred to as XSS or CSS. You must know the user is online and you must scam that user into clicking on a link that you have sent in order for this hack attack to work.