1. Buffer overflow
2. SQL injection
3. Cross-site scripting
4. Man-in-the-middle attack
sidebar interaction. Press tab to begin.
In which of the following forms of attack can security flaws allow unauthorized users to gain access to the system?
1 answer