Watch this video on YouTube
Which of the following threat types involves the sending of commands or arbitrary data through an application’s input fields in an attempt to execute them as part of normal processing?