Which one of the following choices best describes data tainting?

Which one of the following choices best describes data tainting?

Which one of the following choices best describes data tainting?

A.
Tainted data can be used by eval, system, or exec.

B.
Tainted data cannot be accessed by the script.

C.
Variables containing external data cannot be used outside the script.

D.
Data tainting is enabled using the -D switch.



Leave a Reply 0

Your email address will not be published. Required fields are marked *