A3 Build Your Own Flashcards
(2 cards)
1
Q
Which of the following attacks is OS-based?
An attacker crafts input for a web form that is SQL code designed to change data in the backend database
An attacker impersonates a manager at a company in order to convince an employee to give them sensitive information
An attacker exploits a vulnerability in how a system handles file permission to gain root access to the system
An attacker tricks a user on the internet to perform an action on a website where they are already authenticated
A
2
Q
A
WEB