Which of the following techniques can be bypass a user or computer’s web browser privacy
settings? (Select Two)
A.
SQL injection
B.
Session hijacking
C.
Cross-site scripting
D.
Locally shared objects
E.
LDAP injection
Explanation:
Which of the following techniques can be bypass a user or computer’s web browser privacy
settings? (Select Two)
Which of the following techniques can be bypass a user or computer’s web browser privacy
settings? (Select Two)
A.
SQL injection
B.
Session hijacking
C.
Cross-site scripting
D.
Locally shared objects
E.
LDAP injection
Explanation: