What is malicious code that is inserted into a vulnerable application called?

Assets, Threats, and Vulnerabilities | Weekly challenge 4 Quiz | 

What is malicious code that is inserted into a vulnerable application called?

  • Cryptojacking
  • Input validation
  • Social engineering
  • Injection attack

 

Leave a Comment