Which of the following BEST describes a SQL Injection attack?
A.
The attacker attempts to have the receiving server pass information to a back-end database from which it can compromise the stored information.
B.
The attacker attempts to have the receiving server run a payload using programming commonly found on web servers.
C.
The attacker overwhelms a system or application, causing it to crash and bring the server down to cause an outage.
D.
The attacker overwhelms a system or application, causing it to crash, and then redirects the memory address to read from a location holding the payload.
B.
The attacker attempts to have the receiving server run a payload using programming commonly found on web servers.