1.

In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.

A. SQL injection
B. SQL
C. Direct
D. Application
Answer» B. SQL


Discussion

No Comment Found