1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DedPeter [7]
3 years ago
10

An organization has a website with a guest book feature, where visitors to the web site can input their names and comments about

the organization. Each time the guest book web page loads, a message box is prompted with the message "You have been P0wnd" followed by redirection to a different website. Analysis reveals that the no input validation or output encoding is being performed in the web application. This is the basis for the following type of attack?A. Denial of ServiceB. Cross-site Scripting (XSS)C. Malicious File ExecutionD. Injection Flaws
Computers and Technology
2 answers:
zepelin [54]3 years ago
8 0

Answer:

C: Malicious File Execution

Explanation:

An emmbedded file in the Landing page of the website cause the page to be automatically redirected to another source, the new page loads automatically, malicious execution of the webpage redirects the new site to another link, and makes such traffic meant for the site to be automatically turned to another website.

kozerog [31]3 years ago
6 0

Answer:

B

Explanation:

You might be interested in
What can be controlled through IoT? Choose four answers.
Maru [420]

<em>The answer is: </em>

<em> </em>

<em>Door locks, light switches, security cameras and desktops (even laptops too) </em>

<em> </em>

<em>When we say Internet of Things, it is basically all objects that can be connected to internet (objects that are parts of our daily lives) can be included in this phrase or quote). There are technologies pertaining to common household items such as locks, switches and cameras that can be controlled through the use of phones and internet. These things collect and stores data such as names, fingerprints, pictures and scans that are used for verification and authentication purposes. </em>

<em> </em>

<em />

5 0
3 years ago
Choose the correct answer base on the Components of Computer System
kondor19780726 [428]
1 - b - Excel is a computer program, so it'd be Software
2 - a - Process of elimination, haven't heard of the term 'peopleware' before.
3 - d - A joystick accepts input from a user to interact with a computer. ex. Flight Simulators
4 - c - A monitor will display (or output) an image based on what is received from the computer.
4 0
3 years ago
What benefits did evolution realize by using the crm software?
Elza [17]
Hello there!
Answer:
Have included productivity improvements (doubling the number of deliveries for a speci²c time period), enhanced inventory management, automation of picklists, better resource planning, and more e±ective reporting to key stakeholders. Evolution’s CRM system can determine deliveries planned for any future month and the amount of product in stock, helping Evolution reduce stock holding by 40%. When a new patient is keyed onto system, tasks can be generated for Evolution’s team to organize delivery ahead of time. The system automatically generates a pick list for that patient from Evolution’s pharmacy. Managers can see tasks 2 weeks ahead and can allocate resources accordingly. Hoping this helps you! :D
4 0
3 years ago
Josh is learning about hackers known for causing damage and altering functions of websites. Which type of hacker is he learning
amid [387]

Answer:

WHITE HACKERS

Explanation: When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not tell others about it until it has been fixed. In contrast, the black hat will illegally exploit it or tell others how to do so. The gray hat will neither illegally exploit it nor tell others how to do so.

4 0
2 years ago
Read 2 more answers
Professor Gekko has always dreamed of inline skating across North Dakota. He plans to cross the state on highway U.S. 2, which r
geniusboy [140]

The efficient algorithm by which he can determine which water stops he should make; <em>has been determined below and the strategy which is the greedy strategy has been proven to yield an optimal solution.</em>

<em />

To solve this question optimally, we will make use of the greedy solution.

In this method, we will maximize the distance that can be covered from a particular point in such a way that there must be a place where water can be gotten before a run out is experienced.

Now, the first point at which there will be a stop should be located at a point that is farthest from the starting position and is also made to be ≤ m miles from the starting position.

Now, this this situation is one that shows optimal substructure and since our  first stopping point will be made to be at p, it means that we are solving the sub-question with the assumption that our starting point is at p.

When we combine the two stated plans above, we will arrive at an optimal solution for the normal reasons via cut and paste.

B) Now we need to show that the greedy approach earlier used produce a first stopping point which is contained in the optimal solution.

Let O represent any optimal solution whereby the professor stops at positions o₁, o₂, o₃....oₙ.

Let h₁ represent the farthest stopping point that is reachable from the starting point. Then we can replace o₁ by h₂ to generate a modified solution H since o₁ - o₂ < o₂ - h₁.

Finally, we can really make it to the positions in H without having to run out of water and since H has the same number of stops, we can conclude that h₁   is contained in one of optimal solution.

Therefore our strategy which is the greedy strategy has been proven to work.

Read more about algorithms at; brainly.com/question/24793921

8 0
2 years ago
Other questions:
  • List and briefly defined categories of security services.
    8·1 answer
  • How do I do a PowerPoint
    10·2 answers
  • Who wants to join my zoom after school 23456+4567
    15·1 answer
  • Implement a method called bubbleSort, that takes an ArrayList, sorts it using bubble sort algorithm, and returns a sorted list;
    14·1 answer
  • End-user computer refers to a group of end users working together to manage their interactions with a computer.
    10·1 answer
  • True or False (1 point each)
    9·1 answer
  • : How can Internet technologies help a business form strategic alliances with its customers, suppliers, and others?
    10·1 answer
  • An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC is not in use, is padding needed
    15·1 answer
  • * what is an electronic mail ?
    13·1 answer
  • What is the output of this program? Assume the user enters 3, 6, and 11.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!