Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION 26 In the attack the user supplied input is used to construct a SQL req

ID: 3721288 • Letter: Q

Question

QUESTION 26 In the attack the user supplied input is used to construct a SQL request to retrieve infomation from a database PHP remote code injection SQL injection Cross-site scripting xss reflection QUESTION 27 attacks are most commonly seen in scripted Web applications. PHP remote code injection SQL injection Cross-site scripting XSS reflection QUESTION 28 A variant where the attacker includes malicious script content in data supplied to a site is the vulnerability. PHP remote code injection SQL injection Cross-site scripting XSS reflection QUESTION 29 attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server. command injection SQL injection code injection PHP remote code injection QUESTION 30 attack is where the input includes code that is then executed by the attacked system SQL injection cross-site scripting code injection interpreter injection

Explanation / Answer

just view some videos to understand them since their definitions cannot be typed here.

26.a sql injection since he is using sql commands

27.cross site scripting is the most famous one

28.d.xss reflection=>Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off of a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.(just read its definiton)

29.a.command injection=>Command injection is an attack in which the goal is execution of arbitrarycommands on the host operating system via a vulnerable application.

30.b.croos site scripting=>Cross-Site Scripting (XSS) attacks are a type of injection, in which maliciousscripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote