1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
3 years ago
12

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users,

is potentially vulnerable to a kind of attack called a ___________________ attack.a. Two-factor authenticationb. Cross-site request forgeryc. Cross-site scriptingd. Cross-site scoring scripting
Computers and Technology
2 answers:
sladkih [1.3K]3 years ago
7 0

Answer:

C. Cross-site scripting

Explanation:

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a <u>Cross-site scripting.</u>

balandron [24]3 years ago
5 0

Answer:

Option(c) is the correct answer.

Explanation:

Cross-site scripting is the type of security breach that are usually found in the  software applications.The main objective of cross site scripting it is used by the hackers to exploit the data security.

  • The cross site scripting is the collection of web pages  that enables people to insert the text like comment,  name stores it afterwards it save the data and then  it appears to the other users.
  • Others options are incorrect because they are not related to given scenario.
You might be interested in
Angelina, the outgoing student body president, has finished a report about the upcoming school election. She wants to add a bord
stepladder [879]

Answer: page background, page borders, color

Explanation: just did the assignment

4 0
3 years ago
Read 2 more answers
Renée’s job entails using a company laptop to constantly open other peoples’ workbooks, sorting the data, importing a new sheet
nevsk [136]

she should leave and go somewhere else for a mminute to cool and then come backa nd close tabs.

6 0
3 years ago
In a Position Analysis Questionnaire (PAQ), _____ refers to the physical activities, tools, and devices used by a worker to perf
xxMikexx [17]

Answer:

Work Output.

Explanation:

The work output in a PAQ refers to that of the physical exercise, equipment, and technologies an individual uses to perform a service. The main justification for using a PAQ is to acquire quantitative info that helps administrators to analyze employments for payment reasons.

So, the following answer is correct about the given scenario.

8 0
4 years ago
Suppose that alpha, beta, and gamma are int variables and the input is: 100 110 120 200 210 220 300 310 320 What is the value of
barxatty [35]

Answer:

The answer to this question is the option "C".

Explanation:

In the question, it is given that alpha, beta, and gamma are an integer variable that assigns the value. In this code, we use the ignore() function. This function used to ignore or clear one or more characters from the input buffer. So the answer to this question is 300.

3 0
4 years ago
Which of the following peripheral devices can be used for both input and output? mouse printer CPU touch screen on a tablet comp
LenaWriter [7]
Touch Screen, it provides both visual output and touch input.                                                
3 0
4 years ago
Read 2 more answers
Other questions:
  • Which feature of Microsoft power point allowed you to put a picture in every slide
    8·1 answer
  • What device can boost an analog signal? a digital signal?
    12·1 answer
  • A student dissolves some solid sodium hydroxide in a beaker of water.
    5·2 answers
  • Which field data type would you use if you'd like to store videos in that field a text b memo c Boolean D binary object E null
    11·2 answers
  • You are using a new release of an application software package. You think that you have discovered a bug. Outline the approach t
    14·1 answer
  • Question 2 In this question you are asked to calculate probabilties for the discrete uniform and exponential distribution. Make
    7·1 answer
  • write the structure of an email message ques.2 what do you mean by search engine? write its component .ques. 3 what are the adva
    9·1 answer
  • If your computer has a ________, someone else can gain access to it undetected.
    10·1 answer
  • Host A sends a packet of length 1,100 bytes to host B over a link with transmission rate 4 Mbps over a distance 1300 km, propaga
    15·1 answer
  • Problem 8 - Recursive Divisible by 3 and 5 Complete the divBy3And5 function which accepts a list of integers. The function shoul
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!