Q. In which of the following exploits does an attacker insert malicious coding into a link that appears to be from a trustworthy source? (Solved)

1. Cross-site scripting

2. Command injection

3. Path traversal attack

4. Buffer overflow

  • a. Cross-site scripting
Subscribe Now

Get All Updates & News