Question
Which of the following best describes the technique demonstrated in the sample code?
Denial of Service attack
SQL injection
Cross-site scripting
Phishing
Submit
Skip