Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called
A) a Trojan horse.
B) an SQL injection attack.
C) key logging.
D) a DDoS attack.
Answer: B
Management Information Systems Multiple Choice Questions and Answers.
A) a Trojan horse.
B) an SQL injection attack.
C) key logging.
D) a DDoS attack.
Answer: B
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.