Which of the following attack types best describes database record accessibility?
A.
Directory transversal attack
B.
SQL attack
C.
UNICODE attack
D.
Buffer overflow attack
Explanation:
If the web application is written to access a database there is the threat of SQL injection, where instead of valid input the attacker puts actual database commands into the input fields, which are then parsed and run by the application. SQL (Structured Query Language) statements can be used by attackers to bypass authentication and reveal all records in a database.