1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DedPeter [7]
3 years ago
10

An organization has a website with a guest book feature, where visitors to the web site can input their names and comments about

the organization. Each time the guest book web page loads, a message box is prompted with the message "You have been P0wnd" followed by redirection to a different website. Analysis reveals that the no input validation or output encoding is being performed in the web application. This is the basis for the following type of attack?A. Denial of ServiceB. Cross-site Scripting (XSS)C. Malicious File ExecutionD. Injection Flaws
Computers and Technology
2 answers:
zepelin [54]3 years ago
8 0

Answer:

C: Malicious File Execution

Explanation:

An emmbedded file in the Landing page of the website cause the page to be automatically redirected to another source, the new page loads automatically, malicious execution of the webpage redirects the new site to another link, and makes such traffic meant for the site to be automatically turned to another website.

kozerog [31]3 years ago
6 0

Answer:

B

Explanation:

You might be interested in
Which would increase electric current? increasing the resistance increasing the size of the wire decreasing the voltage
Neko [114]
The answer is the second answer Increasing the size of the wire.
8 0
3 years ago
4. Who developed the first design technology program which had a
HACTEHA [7]

Answer:

Macintosh.

Explanation:

Macintosh refers to a set of computers designed, developed and manufactured by Apple Inc. Apple officially began the sales of Macintosh on the 24th of January, 1984. The first designs of Macintosh are considered to be personal computers and had a mouse, in-built screen with a graphical user interface (GUI).

Macintosh developed the first design technology program which had a mouse and allowed for photo manipulation. This technology or software program used for photo manipulation is known as MacPaint, it was a raster graphics editor which was originally coded by Bill Atkinson using a Pascal programming language while its graphical user interface was designed by Susan Kare.

5 0
3 years ago
Kayla wants to know whether she should set her network up as a WAN or a LAN. What are the three questions you would ask her, and
Ann [662]
Due to it's typically massive size, WAN's are almost always slower then a LAN. The further the distance, the slower the network. One of the big disadvantages to having a WAN is the cost it can incur. Having a private WAN can be expensive.
3 0
3 years ago
Can some one help please
quester [9]

Answer:

I think its screenplay

Explanation:

Firstly, the question starts with an a so it can't be b. And format can't be repeated. Which leaves us with screenplay.

Hope this helps.

8 0
1 year ago
How do you take a picture on this app
damaskus [11]
The paper clip.

Hope this helped.

Can i have brainliest?
8 0
3 years ago
Other questions:
  • Generate the requested sets using only set builder notation and the provided sets. Some problems may require you to build one or
    15·1 answer
  • Write down the pseudo code of a program that calculates the Body Mass Index (BMI) of
    9·1 answer
  • Often used in connection with a business
    6·1 answer
  • PowerPoint allows you to input files from variety of sources, such as Microsoft access.
    6·1 answer
  • Web and mobile applications are created for users to only read information. True False
    15·2 answers
  • Dang was accepted to a biology program with a rigorous schedule and a high tuition, but good professors. What would be a benefit
    10·2 answers
  • Which letter would appear in the third position of the standard wheel marking of a hard-grade wheel?
    10·2 answers
  • 3. Discuss microprocessor components, chips,
    15·1 answer
  • Cuáles eran las condiciones de vida de las mujeres durante el renacimiento perduran​
    14·1 answer
  • Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!