In which of the following exploits does an attacker insert malicious code into a link that appears to be from a trustworthy source?

  1. Cross-Site Scripting

  2. Buffer over flows

  3. Command injection

  4. Path traversal attack


Correct Option: A
Explanation:

To answer this question, the user needs to have knowledge about different types of cyber attacks and their characteristics.

The correct answer is:

A. Cross-Site Scripting (XSS): In this type of attack, the attacker injects malicious code (usually in the form of a script) into a link that appears to be from a trustworthy source, such as a website or an email. When a user clicks on the link, the malicious code is executed in the user's web browser, allowing the attacker to steal sensitive information or perform other malicious actions.

B. Buffer overflows: In this type of attack, the attacker sends more data to a program than it can handle, causing it to crash or allowing the attacker to execute arbitrary code.

C. Command injection: In this type of attack, the attacker injects malicious code into a system command that is executed by the target system, allowing the attacker to gain unauthorized access or perform other malicious actions.

D. Path traversal attack: In this type of attack, the attacker exploits a vulnerability in a web application to access files or directories that are outside the web root directory.

Therefore, the correct answer is:

The Answer is: A. Cross-Site Scripting.

Find more quizzes: