Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called
A) a Trojan horse.
B) an SQL injection attack.
C) key logging.
D) a DDoS attack.
Correct Answer:
Verified
Q30: _ refers to all of the methods,
Q31: Which of the following is not one
Q32: An independent computer program that copies itself
Q33: Which of the following is not an
Q34: A keylogger is a type of
A) worm.
B)
Q36: Electronic data are more susceptible to destruction,
Q37: Which of the following statements about the
Q38: Which of the following is not an
Q39: Sniffing is a security challenge that is
Q40: _ refers to policies, procedures, and technical
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents