Certified Ethical Hacker 312-50v10 – Question057

Which of the following attacks exploits web age vulnerabilities that allow an attacker to force an unsuspecting users browser to send malicious requests they did not intend?

Command Injection Attacks
B. File Injection Attack
C. Cross-Site Request Forgery (CSRF)
D. Hidden Field Manipulation Attack

Correct Answer: C