Which of the following is a type of vulnerability that attackers can exploit to read sensitive data from the database, modify or delete database data, execute administration operations on the database, and even issue commands to the operating system?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which of the following is a type of vulnerability that attackers can exploit to read sensitive data from the database, modify or delete database data, execute administration operations on the database, and even issue commands to the operating system?
A . SQL injection
B . SQL buffer overflow
C . SQL drop
D . SQL bomb

Answer: A

Leave a Reply

Your email address will not be published.