Which of the following BEST describes a SQL Injection attack?
A.
The attacker attempts to have the receiving server pass information to a back-end database
from which it can compromise the stored information.
B.
The attacker attempts to have the receiving server run a payload using programming commonly
found on web servers.
C.
The attacker overwhelms a system or application, causing it to crash and bring the server down
to cause an outage.
D.
The attacker overwhelms a system or application, causing it to crash, and then redirects the
memory address to read from a location holding the payload.