In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.

Fill in the blank(s) with the appropriate word(s).


SQL injection

Computer Science & Information Technology

You might also like to view...

Web mail is an example of SaaS

Indicate whether the statement is true or false

Computer Science & Information Technology

A compilation of sources cited in a report and listed on a separate page is a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the keyboard shortcut to duplicate a layer?

What will be an ideal response?

Computer Science & Information Technology

What are the steps needed to build a behavioral model?

What will be an ideal response?

Computer Science & Information Technology