Which of the following BEST describes a SQL Injection attack?

Which of the following BEST describes a SQL Injection attack?

Which of the following BEST describes a SQL Injection attack?

A.
The attacker attempts to have the receiving server pass information to a back-end database
from which it can compromise the stored information.

B.
The attacker attempts to have the receiving server run a payload using programming commonly
found on web servers.

C.
The attacker overwhelms a system or application, causing it to crash and bring the server down
to cause an outage.

D.
The attacker overwhelms a system or application, causing it to crash, and then redirects the
memory address to read from a location holding the payload.

Explanation:



Leave a Reply 1

Your email address will not be published. Required fields are marked *


ABTech

ABTech

(My Answer is ==>A)SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server.