Saved Bookmarks
| 1. |
In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.(a) SQL injection(b) SQL(c) Direct(d) ApplicationI have been asked this question in final exam.The doubt is from Application Security in chapter Database Programming Techniques of Database Management |
|
Answer» Correct OPTION is (a) SQL injection |
|