

MCQOPTIONS
Saved Bookmarks
1. |
If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________ |
A. | SQL attacks |
B. | SQL injection attacks |
C. | SQL usage attack |
D. | SQL destroyer attack |
Answer» C. SQL usage attack | |