In which of the following exploits does an attacker insert malicious coding into a link that appears to be from a trustworthy source?

  1. Cross site scripting

  2. Command injection

  3. Path traversal attacks

  4. Buffer overflow


Correct Option: A

AI Explanation

To answer this question, you need to understand different types of exploits and attacks. Let's go through each option to understand why it is correct or incorrect:

Option A) Cross-site scripting (XSS) - This option is correct. Cross-site scripting involves an attacker inserting malicious code into a website, which is then executed by a victim's browser. This can be done by inserting the code into a link that appears to be from a trustworthy source, fooling the victim into clicking on it.

Option B) Command injection - This option is incorrect. Command injection is a type of attack where an attacker executes unauthorized commands on a vulnerable system. It typically involves injecting malicious commands into input fields or parameters of a system that processes commands.

Option C) Path traversal attacks - This option is incorrect. Path traversal attacks involve manipulating file paths to access files or directories that are outside of the intended scope. It does not involve inserting malicious coding into a link.

Option D) Buffer overflow - This option is incorrect. Buffer overflow is a vulnerability that occurs when a program tries to store more data in a buffer than it can hold. It can lead to the execution of malicious code, but it does not involve inserting malicious coding into a link.

The correct answer is A) Cross-site scripting (XSS). This option is correct because in cross-site scripting attacks, an attacker inserts malicious coding into a link that appears to be from a trustworthy source.

Find more quizzes: