A3 Build Your Own Flashcards

(2 cards)

1
Q

Which of the following attacks is OS-based?

An attacker crafts input for a web form that is SQL code designed to change data in the backend database

An attacker impersonates a manager at a company in order to convince an employee to give them sensitive information

An attacker exploits a vulnerability in how a system handles file permission to gain root access to the system

An attacker tricks a user on the internet to perform an action on a website where they are already authenticated

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

WEB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly