40. _______________ attacks occur when the injected malicious code is reflected with any response from the web server that consists of the input sent to the web server. The attack is distributed to the victim in a different way, usually in an email message. Once the victim clicks the link, the malicious code navigates to the web page. This action reflects the attack back to the victim web browser, which then executes the malicious script, because the script came from an already trusted web server.