Which of the following is NOT a method of attack that could be used to facilitate stealing data?

A web application is connected to an IoT endpoint. A hacker wants to steal data from the connection between them.

Which of the following is NOT a method of attack that could be used to facilitate stealing data?
A . Cross-Site Request Forgery (CSRF)
B. SQL Injection (SQLi)
C. Cross-Site Scripting (XSS)
D. LDAP Injection

Answer: D

Latest ITS-110 Dumps Valid Version with 100 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments