Q:

If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________

0

If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________


  1. SQL attacks
  2. SQL injection attacks
  3. SQL usage attack
  4. SQL destroyer attack

All Answers

need an explanation for this answer? contact us directly to get an explanation for this answer

(b).SQL injection attacks

need an explanation for this answer? contact us directly to get an explanation for this answer

total answers (1)

CRYPTOGRAPHY AND NETWORK SECURITY - NETWORK SECURITY CONCEPTS MCQ

This question belongs to these collections

Similar questions


need a help?


find thousands of online teachers now
An attack on a website that stores and displays te... >>
<< The information that gets transformed in encryptio...