What attack is being depicted here?
what do you think Jane has changed?
What attack will his program expose the web application to?
What vulnerability is detected in the web application here?
What is wrong with the web application?
What are some common vulnerabilities in web applications that he should be concerned about?
What do you think has occurred?
What does black box testing mean?
What kind of assessment will you be performing ?
Why is Jim having these problems?