Q:

In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker

0

In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.


  1. SQL injection
  2. SQL
  3. Direct
  4. Application

All Answers

need an explanation for this answer? contact us directly to get an explanation for this answer

 (a).SQL injection

need an explanation for this answer? contact us directly to get an explanation for this answer

total answers (1)

This question belongs to these collections

Similar questions


need a help?


find thousands of online teachers now