1.

Any user-controlled parameter that gets processed by the application includes vulnerabilities like ___________(a) Host-related information(b) Browser-related information(c) Application parameters included as part of the body of a POST request(d) All of the mentionedI have been asked this question in an interview.Question is from SQL Injection in division Developing with SQL Server of SQL Server

Answer»

Correct ANSWER is (d) All of the mentioned

For EXPLANATION I would say: SQL-injection exploit requires TWO things: an entry point and an exploit to ENTER.



Discussion

No Comment Found

Related InterviewSolutions