📢 Too many exams? Don’t know which one suits you best? Book Your Free Expert 👉 call Now!


    âš¡ BIG BEE DAYS Are Live - Spin the Wheel to Get BIGGEST DISCOUNT of the Year -âš¡

    Question

    What type of attack exploits vulnerabilities in input

    validation to run malicious SQL commands?
    A Phishing Correct Answer Incorrect Answer
    B Cross-Site Scripting Correct Answer Incorrect Answer
    C SQL Injection Correct Answer Incorrect Answer
    D Denial of Service Correct Answer Incorrect Answer

    Solution

    SQL Injection is a cyber attack where malicious SQL code is inserted into input fields to manipulate the database.

    Practice Next
    ask-question