In ____ injections, intruders send SQL injections with no intention of receiving data from the database.

A. indirect channel
B. inferential
C. multichannel
D. complex


Answer: B

Computer Science & Information Technology

You might also like to view...

When you run ___________ to generalize an image, you must also select a system cleanup action.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

?'Backward compatible' means that documents that are saved by an older version can be read by the newer software.

A. Yes B. No

Computer Science & Information Technology

To create a parameter query, enter a parameter rather than a specific value as a criterion in the design grid. The parameter must be enclosed in _____.

A. curly braces { } B. square brackets [ ] C. parentheses ( ) D. single quotes ‘'

Computer Science & Information Technology

________ is a password-cracking method wherein the attacker tries all possible passwords, starting with single-character passwords.

A. A hybrid dictionary attack B.A combinatorial attack C. A dictionary attack D. Brute-force guessing

Computer Science & Information Technology