Q. In attacks, the attacker manages to get an application to execute an SQL query created by the attacker.
β
Correct Answer: (A)
sql injection
You must be Logged in to update hint/solution
Discussion
Question Analytics
479
Total Visits
3 y ago
Published
Mr. Dubey
Publisher
89%
Success Rate