CompTIA Exam Questions

Which of the following attacks takes advantage of user …

Which of the following attacks takes advantage of user provided input to inject executable binary code into a running program?

A.
SQL injection

B.
Session hijacking

C.
Heder manipulation

D.
Buffer overflow