adplus-dvertising
frame-decoration

Question

The attack which involves the insertion of malicious code into a page frequented by other users is known as..

a.

basic sql injection

b.

advanced sql injection

c.

cross-site scripting

d.

scripting

Posted under PHP

Answer: (c).cross-site scripting

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The attack which involves the insertion of malicious code into a page frequented by other users is known as..

Similar Questions

Discover Related MCQs

Q. When you use the $_GET variable to collect data, the data is visible to..

Q. When you use the $_POST variable to collect data, the data is visible to..

Q. Which variable is used to collect form data sent with both the GET and POST methods?

Q. Which one of the following should not be used while sending passwords or other sensitive information?

Q. Which function is used to remove all HTML tags from a string passed to a form?

Q. To validate an email address, which flag is to be passed to the function filter_var()?

Q. How many validation filters like FILTER_VALIDATE_EMAIL are currently available?

Q. How many predefined variables does PHP use to authenticate a user?

Q. Which of the following variables does PHP use to authenticate a user?

i) $_SERVER[‘PHP_AUTH_USER’].
ii) $_SERVER[‘PHP_AUTH_USERS’].
iii) $_SERVER[‘PHP_AUTH_PU’].
iv) $_SERVER[‘PHP_AUTH_PW’].

Q. Which of the following PHP function is commonly used when handling authentication via PHP?

i) header()
ii) footer()
iii) inset()
iv) isset()

Q. Which function is used to verify whether a variable contains a value?

Q. Which of the following are types of PHP authentication implementation methodologies?

i) Hard-coding a login pair directly into the script
ii) File-based authentication
iii) Data-based authentication
iv) PEAR’S HTTP authentication

Q. In which authentication method does changing the username or password can be done only by entering the code and making the manual adjustment.

Q. The authenticationFile.txt, the file which stores username and password should be stored ___ the server document root.

Q. Which function is used to split a string into a series of substrings, with each string boundary is determined by a specific separator?

Q. In which of the following situations does file-based authentication become inconvenient.

i) small list
ii) large number of user
iii) users are being regularly added
iv) static authentication

Q. Which is the most powerful authentication method among the four?

Q. Which directive determines whether PHP scripts on the server can accept file uploads?

Q. Which of the following directive determines the maximum amount of time that a PHP script will spend attempting to parse input before registering a fatal error?

Q. What is the default value of max_input_time directive?