1.

________ is exploited by influencing SQL statements that do not filter input from applications to a back-end database correctly.

Answer»

________ is exploited by influencing SQL STATEMENTS that do not filter INPUT from APPLICATIONS to a backend database correctly.
Choose the correct option from below list
(1)DoS Attacks
(2)Privilege issues
(3)Data LEAKS
(4)SQL Injection

Answer:-(4)SQL Injection



Discussion

No Comment Found