1.

In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.(a) SQL injection(b) SQL(c) Direct(d) ApplicationI have been asked this question in final exam.The doubt is from Application Security in chapter Database Programming Techniques of Database Management

Answer»

Correct OPTION is (a) SQL injection

Best EXPLANATION: Application security has to deal with several security THREATS and issues BEYOND those handled by SQL authorization.



Discussion

No Comment Found

Related InterviewSolutions