If a Web application that communicates with a database has not been audited, a potential SQL ____ risk remains.

A. infection
B. encryption
C. injection
D. projection


Answer: C

Computer Science & Information Technology

You might also like to view...

____________________ is the combination of design characteristics that are applied to text.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Implied addressing addresses the entire primary memory space

Indicate whether the statement is true or false.

Computer Science & Information Technology

A binary tree is good for storing information that needs to be searched quickly, such as a dictionary or phone directory.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Classify the following attributes as binary, discrete, or continuous. Also classify them as qualitative (nominal or ordinal) or quantitative (interval or ratio). Some cases may have more than one interpretation, so briefly indicate your reasoning if you think there may be some ambiguity. Example: Age in years. Answer: Discrete, quantitative, ratio

What will be an ideal response?

Computer Science & Information Technology