CompTIA Exam Questions

Which of the following was used to perform this attack?

Sara, a hacker, is completing a website form to request a free coupon. The site has a field that
limits the request to 3 or fewer coupons. While submitting the form, Sara runs an application on
her machine to intercept the HTTP POST command and change the field from 3 coupons to 30.
Which of the following was used to perform this attack?

A.
SQL injection

B.
XML injection

C.
Packet sniffer

D.
Proxy

Explanation: