An attack that tricks a database management system into interpreting part of an entered password as an SQL expression is called:

What will be an ideal response?


command injection

Computer Science & Information Technology

You might also like to view...

Which access control principle restricts users to having access appropriate to the level required for their assigned duties?

A. Least privilege B. Need to know C. Role based controls D. Separation of duties

Computer Science & Information Technology

You can access temporary files created by AutoRecover to recover a document that was NOT saved

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ function is used to join up to 255 strings of characters

A) MID B) UPPER C) CONCATENATE D) LOWER

Computer Science & Information Technology

If you wish to develop expertise in database management, you must learn popular language known as ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology