The goal of the ____ attacker is to inject a SQL query/command as an input, possibly via Web pages.

A. phishing
B. XSS
C. SQL injection
D. denial of service


Answer: C

Computer Science & Information Technology

You might also like to view...

A picture or decoration created to enhance the appearance of written material or to clarify or augment its meaning

Computer Science & Information Technology

If you are creating a PivotTable using the record set of query, you can add a calculated field to the query design grid, and it will appear in the PivotTable Field List when you switch the query to PivotTable View

Indicate whether the statement is true or false

Computer Science & Information Technology

Which statement is true about PCI, PCI -X, and PCIe?

A) PCI can transmit and receive data simultaneously. B) PCI-X is a serial bus. C) PCIe can operate in full duplex. D) PCI is backward compatible with PCI e.

Computer Science & Information Technology

Which is an example of indirect costs?

A. Project team members’ salaries B. Hardware purchases used only for new systems C. Consumable supplies costs D. Insurance expenses

Computer Science & Information Technology