Q.

In                                    attacks, the attacker manages to get an application to execute an SQL query created by the attacker.

A. sql injection
B. sql
C. direct
D. application
Answer» A. sql injection
1.8k
0
Do you find this helpful?
6

Discussion

No comments yet