An attack that tricks a database management system into interpreting part of an entered password as an SQL expression is called:
What will be an ideal response?
command injection
Computer Science & Information Technology
You might also like to view...
Which access control principle restricts users to having access appropriate to the level required for their assigned duties?
A. Least privilege B. Need to know C. Role based controls D. Separation of duties
Computer Science & Information Technology
You can access temporary files created by AutoRecover to recover a document that was NOT saved
Indicate whether the statement is true or false
Computer Science & Information Technology
The ________ function is used to join up to 255 strings of characters
A) MID B) UPPER C) CONCATENATE D) LOWER
Computer Science & Information Technology
If you wish to develop expertise in database management, you must learn popular language known as ______.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology