Which of the following techniques can be bypass a user or computers web browser
privacy settings? (Select Two)
A. SQL injection
B. Session hijacking
C. Cross-site scripting
D. Locally shared objects
E. LDAP injection
Which of the following techniques can be bypass a user or computers web browser
privacy settings? (Select Two)
A. SQL injection
B. Session hijacking
C. Cross-site scripting
D. Locally shared objects
E. LDAP injection