1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
3 years ago
12

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users,

is potentially vulnerable to a kind of attack called a ___________________ attack.a. Two-factor authenticationb. Cross-site request forgeryc. Cross-site scriptingd. Cross-site scoring scripting
Computers and Technology
2 answers:
sladkih [1.3K]3 years ago
7 0

Answer:

C. Cross-site scripting

Explanation:

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a <u>Cross-site scripting.</u>

balandron [24]3 years ago
5 0

Answer:

Option(c) is the correct answer.

Explanation:

Cross-site scripting is the type of security breach that are usually found in the  software applications.The main objective of cross site scripting it is used by the hackers to exploit the data security.

  • The cross site scripting is the collection of web pages  that enables people to insert the text like comment,  name stores it afterwards it save the data and then  it appears to the other users.
  • Others options are incorrect because they are not related to given scenario.
You might be interested in
Why can't you test a program for run-time errors when it has compile-time (syntax) errors
Leno4ka [110]

Answer:

your computer will not allow it

Explanation:

because it is not one of the main dyonostics

6 0
3 years ago
Which of the following statements is true of a server? Question 18 options: A) It supports processing requests from remote compu
TiliK225 [7]

Answer:

Option (A) is the correct answer of this question.

Explanation:

The server supports the processing requests from the remote computers. A system is a device built to accommodate inquiries from many other external systems and customers to execute transactions. Employees are called private computer ,tablets, including phones which connect websites.

Network resources are handled through servers.The server is a software application or tool providing a service to some other software program and its customer, also identified as those of the user.

Other options are incorrect because they are not related to the given scenario.

5 0
3 years ago
La sentencia de ASIGNAR es una sentencia de entrada de datos, verdadero o falso ?
Akimi4 [234]

Answer:

sorry can´t understand langues

Explanation:

cant

7 0
3 years ago
Which tool do you think would be the most useful if you were designing a logo for a business?
Maurinko [17]

Answer:

maybe a computer would be helpful

6 0
3 years ago
Read 2 more answers
Which type of image would require you to obtain permission from the author to use the image and possibly pay a royalty to the au
ASHA 777 [7]

Answer:

Copyrighted.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of

I. Trademarks.

II. Patents.

III. Copyright.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

Hence, a copyrighted image would require you to obtain permission from the author to use the image and possibly pay a royalty to the author for its use.

7 0
3 years ago
Other questions:
  • Blank spaces or unseen control characters in a data file are referred to as
    5·2 answers
  • Write a program in which given an integer num, return the sum of the multiples of num between 1 and 100. For example, if num is
    7·1 answer
  • Enum Digits {0, 1};
    10·1 answer
  • Next, Kim decides to include a diagram of a frog’s life cycle in her presentation. She wants to use an image that is part of a p
    15·2 answers
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    12·2 answers
  • Calculate the ERA
    6·1 answer
  • Which mark is an indicator of invalid data in a cell?
    11·1 answer
  • What is the best food to eat before workout? why?​
    10·2 answers
  • 72. In Object Oriented Programming, a class_____ starts
    12·1 answer
  • WHATS YALL FAVORITE GAME WHOEVER GIVES THE BEST ANSWER WINS 200
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!