Which of the following types of application attacks would be used to specifically gain unauthorized information from databases that did not have any input validation implemented?

Which of the following types of application attacks would be used to specifically gain unauthorized
information from databases that did not have any input validation implemented?

Which of the following types of application attacks would be used to specifically gain unauthorized
information from databases that did not have any input validation implemented?

A.
SQL injection

B.
Session hijacking and XML injection

C.
Cookies and attachments

D.
Buffer overflow and XSS



Leave a Reply 0

Your email address will not be published. Required fields are marked *