In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.
(a).SQL injection
total answers (1)
start bookmarking useful questions and collections and save it into your own study-lists, login now to start creating your own collections.
(a).SQL injection
need an explanation for this answer? contact us directly to get an explanation for this answer