πŸ“’ Too many exams? Don’t know which one suits you best? Book Your Free Expert πŸ‘‰ call Now!


    Question

    What type of attack exploits vulnerabilities in input

    validation to run malicious SQL commands?
    A Phishing Correct Answer Incorrect Answer
    B Cross-Site Scripting Correct Answer Incorrect Answer
    C SQL Injection Correct Answer Incorrect Answer
    D Denial of Service Correct Answer Incorrect Answer

    Solution

    SQL Injection is a cyber attack where malicious SQL code is inserted into input fields to manipulate the database.

    Practice Next
    More Computer Awarenes Questions
    ask-question