The most common variant of injecting malicious script content into pages returned to users by the targeted sites is the _________ vulnerability.
A. XSS reflection B. chroot jail
C. atomic bomb D. PHP file inclusion
Question 2
_________ are a collection of string values inherited by each process from its parent that can affect the way a running process behaves.
A. Deadlocks B. Privileges
C. Environment variables D. Race conditions