Which result of a successful attack is true?

Posted by: Pdfprep Category: 210-250 Tags: , ,

The target web application server is running as the root user and is vulnerable to command injection.

Which result of a successful attack is true?
A . cross-site scripting
B . cross-site request forgery
C . privilege escalation
D . buffer overflow

Answer: B

Leave a Reply

Your email address will not be published.