MCQOPTIONS
Saved Bookmarks
| 1. |
If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________ |
| A. | SQL attacks |
| B. | SQL injection attacks |
| C. | SQL usage attack |
| D. | SQL destroyer attack |
| Answer» C. SQL usage attack | |