in Education by
This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here? (a) SQL injection (b) HTML Injection (c) Cross Site Scripting (XSS) (d) Cross Site Request Forgery (XSRF) The question was asked in an online interview. I'd like to ask this question from Cyber Attacks Types in portion Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right option is (c) Cross Site Scripting (XSS) Explanation: XSS attack can be infused by putting the malicious code (which gets automatically run) in any comment section or feedback section of any webpage (usually a blogging page). This can hamper the reputation of a site and the attacker may place any private data or personal credentials.

Related questions

0 votes
    Malicious code can be pushed into the _________ during ______________ attack. (a) stack, buffer-overflow (b) queue, ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    A ____________ takes over your system's browser settings and the attack will redirect the websites you visit some other ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    A computer ________ is a malicious code which self-replicates by copying itself to other programs. (a) ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following scripting language is used for injecting executable malicious code for web-app hacking? ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment. (a ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    _______________ needs to be turned off in order to prevent from this attack. (a) Email scripting (b) Email ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    _____________ is the attack method for decoding user credentials. Using this technique an attacker can log on ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Malicious adware may sneak into your system by __________ different ways. (a) five (b) four (c) three ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Trojan-Downloader is a special type of trojans which can download & install new versions of malicious programs ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    By gaining access to the Trojaned system the attacker can stage different types of attack using that ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
...