A user's login credentials were recently compromised. During the investigation, the security analyst determined
the user input credentials into a pop-up window when prompted to confirm the username and password.
However, the trusted website does not use a pop-up for entering user credentials. Which of the following
attacks occurred?
A. Cross-site scripting
B. SQL injection
C. DNS poisoning
D. Certificate forgery
the user input credentials into a pop-up window when prompted to confirm the username and password.
However, the trusted website does not use a pop-up for entering user credentials. Which of the following
attacks occurred?
A. Cross-site scripting
B. SQL injection
C. DNS poisoning
D. Certificate forgery