1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
2 years ago
12

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users,

is potentially vulnerable to a kind of attack called a ___________________ attack.a. Two-factor authenticationb. Cross-site request forgeryc. Cross-site scriptingd. Cross-site scoring scripting
Computers and Technology
2 answers:
sladkih [1.3K]2 years ago
7 0

Answer:

C. Cross-site scripting

Explanation:

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a <u>Cross-site scripting.</u>

balandron [24]2 years ago
5 0

Answer:

Option(c) is the correct answer.

Explanation:

Cross-site scripting is the type of security breach that are usually found in the  software applications.The main objective of cross site scripting it is used by the hackers to exploit the data security.

  • The cross site scripting is the collection of web pages  that enables people to insert the text like comment,  name stores it afterwards it save the data and then  it appears to the other users.
  • Others options are incorrect because they are not related to given scenario.
You might be interested in
5. The best way to clear your Reader is to
Fantom [35]

Answer:

Mark all posts as read

Explanation:

I've did it before

7 0
3 years ago
Read 2 more answers
UC is trying to switch from legacy CRM to salesforce and wants to keep legacy CRM and salesforce in place till all the functiona
nikklg [1K]

Answer: suggesting MDM solution and also linking MDM to both the salesforce and sap. More so, integrating SAP with both Salesforce and legacy CRM.

NB: Don't ever integrate legacy CRM to Salesforce

Explanation:

It should be noted that the best recommendation that could be given in order to keep data in synch b/w Salesforce, legacy CRM and SAP is by suggesting MDM solution and also linking MDM to both the salesforce and sap. More so, integrating SAP with both Salesforce and legacy CRM.

NB: Don't ever integrate legacy CRM to Salesforce

5 0
3 years ago
Lonnie has several workbooks that contain financial and sales data. He needs to ensure that if the data in a single cell in one
Rzqust [24]

Answer: Linked cell

Explanation: I just did a test

7 0
3 years ago
Who have a ps4 ?<br> Who have 2k20? <br> Are you good a 2k20 ? <br> Add me on Ps4 eoKyriie
Lena [83]

Answer:

lol i would but i have an Xbox...

Explanation:

4 0
3 years ago
Read 2 more answers
Write the pseudocode for this flowchart
MrMuchimi

Answer:

Explanation:

class TimeToSleep() {

  main bunch of stuff (string argos) {

       int age;

       string comedy;

       bool guess;

        public bool imTheMasterMethod() {

           guess = true;

           while (guess) {

              comedy = "You forgot to put the flowchart, you meathead!";

              println(comedy);

               

                scan("%d", &age);

                if (age < 18) {

                    println("Go to sleep kiddo!");

                }

           }

        }

   }

}

       

6 0
2 years ago
Other questions:
  • One metric ton is approximately 2,205 pounds.
    6·1 answer
  • The _____ class can be used to get user input using dialog boxes.
    14·1 answer
  • How do you copy and paste plz let me know
    14·2 answers
  • Research the topic of legal and ethical behaviors or dilemmas related to technology. Identify five topics of concern and briefly
    9·1 answer
  • All mla text is double spaced. true false
    13·2 answers
  • Which of the following refers to a collection of colors, fonts, and effects that can be
    6·1 answer
  • Audiovisual means that a presentation combines film and photos.<br> true or false?
    6·2 answers
  • What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sen
    11·1 answer
  • A flower is an example of _______________? (Select the best answer.)
    13·2 answers
  • A(n) ____ is a web-based repository of information that anyone can access, contribute to, or modify.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!