List of questions
Related questions
Question 26 - PT0-003 discussion
As part of a security audit, a penetration tester finds an internal application that accepts unexpected user inputs, leading to the execution of arbitrary commands. Which of the following techniques would the penetration tester most likely use to access the sensitive data?
A.
Logic bomb
B.
SQL injection
C.
Brute-force attack
D.
Cross-site scripting
Your answer:
0 comments
Sorted by
Leave a comment first