Question
Which of the following best describes the technique demonstrated in the sample code?
Phishing
Cross-site scripting
Denial of Service attack
SQL injection
Submit
Skip