Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called

Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called



A) a Trojan horse.

B) an SQL injection attack.

C) key logging.

D) a DDoS attack.



Answer: B


Learn More :