Sam writes and executes a program that can open a web page containing a form and enter JavaScript code in a form field. In this manner, Sam’s program successfully retrieves sensitive information from the web server. Sam’s actions, which changed the web page’s functioning, _____.
a.
are a form of defensive coding
b.
represent a code injection attack
c.
indicate proper form validation
d.
demonstrate JavaScript’s file manipulation capabilities