Assets, Threats, and Vulnerabilities | Weekly challenge 4 Quiz |
What is malicious code that is inserted into a vulnerable application called?
- Cryptojacking
- Input validation
- Social engineering
- Injection attack
Assets, Threats, and Vulnerabilities | Weekly challenge 4 Quiz |
What is malicious code that is inserted into a vulnerable application called?