Which of the following is a proprietary interior protocol that chooses the best path between the source and destination?
What type of XSS vulnerability occurs when a victim is tricked into opening a URL programmed with a rogue script to steal sensitive information?