In a attack, the victim triggers an attack through data that is stored on the targeted web server. In a attack, the attacker triggers an attack through the use of scripting commands in a web browser.
A. DDoS
B. SQL injection
C. XSS
D. CSRF