InterviewSolution
Saved Bookmarks
| 1. |
If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________(a) SQL attacks(b) SQL injection attacks(c) SQL usage attack(d) SQL destroyer attackThe question was posed to me during an interview.Origin of the question is Application Security topic in chapter Application Design and Development of RDBMS |
|
Answer» CORRECT option is (B) SQL injection attacks To explain: If an attacker manages to get an application to EXECUTE an SQL query created by the attacker, then such attacks are called as SQL injection attacks. |
|