1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
2 years ago
12

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users,

is potentially vulnerable to a kind of attack called a ___________________ attack.a. Two-factor authenticationb. Cross-site request forgeryc. Cross-site scriptingd. Cross-site scoring scripting
Computers and Technology
2 answers:
sladkih [1.3K]2 years ago
7 0

Answer:

C. Cross-site scripting

Explanation:

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a <u>Cross-site scripting.</u>

balandron [24]2 years ago
5 0

Answer:

Option(c) is the correct answer.

Explanation:

Cross-site scripting is the type of security breach that are usually found in the  software applications.The main objective of cross site scripting it is used by the hackers to exploit the data security.

  • The cross site scripting is the collection of web pages  that enables people to insert the text like comment,  name stores it afterwards it save the data and then  it appears to the other users.
  • Others options are incorrect because they are not related to given scenario.
You might be interested in
When starting a computer running Windows Vista, a technician sees that the error message "BOOTMGR is missing" appears after the
docker41 [41]

Answer:

B and C

Explanation:

Possible solution to solving "BOOTMGR is missing" error in Windows Vista is to use the Windows Recovery Environment.

Another option is to run "bootrec/fixboot" command from the comman prompt and the command prompt is also accessible from the windows recovery environment.

8 0
3 years ago
What are the two main charaters from maid sama?
Gennadij [26K]

Answer:

Takumi Usui and Misaki Ayuzawa

Explanation:

don't know why this is here

8 0
2 years ago
Read 2 more answers
Assume you have an integer pointer variable named intpoint2. It contains the address 1e6f24. You execute intpoint2++. What does
Serjik [45]

Answer:

c)1e6f28

Explanation:

The integer pointer intpoint2 points to the address 1e6f24.On increasing the inpoint.The intpoint will point to next location and since we know that the memory taken by integers is 4bytes.So the pointer will move to the next location 4 bytes ahead.

1e6f24+4=1e6f28.

Hence the answer is option c.

8 0
2 years ago
Which of the following is a valid JavaSript statement?
myrzilka [38]

Answer:

D

Explanation:

A and B are not valid because you cannot use "=" as a comparator (you must use "==" or "===").

C is not valid because the expression after the conditional is not a statement (it uses "==" instead of "=")

5 0
3 years ago
Read 2 more answers
Risks for standing up for the one who is being bullied
Afina-wow [57]
You, in turn, might end up getting hurt or bullied.
3 0
2 years ago
Other questions:
  • Most languages allow a specialized selection structure called the ____ structure when there are several distinct possible values
    8·1 answer
  • A document that promises to pay specified sums of money on specified dates and is a debt to the issuer is called
    14·1 answer
  • 1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
    6·1 answer
  • Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty de
    9·1 answer
  • Consider the following definition of the recursive function mystery. int mystery(int first, int last) { if (first &gt; last) ret
    12·1 answer
  • Write a C function which mimics the behavior of the assembly language function below. Note that this time, the assembly language
    10·1 answer
  • Whose massively popular photo led to the creation of google images?
    12·1 answer
  • In French class, Blue puts on a visor and the environment changes to that of a café in Paris. Which of the following terms descr
    12·2 answers
  • You can enter common data in multiple worksheets by __________.
    14·2 answers
  • Global communication and transportation technologies are an example of a(n) ____
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!