Question
Which of the following best describes the technique demonstrated in the sample code?
SQL injection
Cross-site scripting
Phishing
Denial of Service attack
Submit
Skip