_______ is a security vulnerability where an attacker can execute unauthorized commands.
- Cross-Site Request Forgery (CSRF)
- Cross-Site Scripting (XSS)
- Man-in-the-Middle (MitM)
- SQL Injection
SQL Injection is a security vulnerability where an attacker can execute unauthorized commands by injecting SQL code into input fields.
Loading...
Related Quiz
- In OAuth, the _______ acts as an intermediary on behalf of the end-user.
- How does caching impact the performance of web services?
- For safe and read-only operations, RESTful services commonly use the _______ method.
- How does Microservices Architecture enhance deployment?
- When implementing HTTPS, what type of encryption is typically used?