CompTIA Network+ N10-009 Practice Question
A large organization recently discovered that despite having extensive filtering and blocking measures in place, their internal research documents were being accessed by unauthorized external entities. Upon investigation, it was found that this was achieved through sophisticated manipulation of network responses. Which type of exploit most likely describes this situation?
Cross-site scripting (XSS)
DNS poisoning
SQL injection
Buffer overflow