1.

If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________

A. SQL attacks
B. SQL injection attacks
C. SQL usage attack
D. SQL destroyer attack
Answer» C. SQL usage attack


Discussion

No Comment Found