Choose the attack type from the choices given below.

Bill is attempting a series of SQL queries in order to map out the tables within the database that he is trying to exploit. Choose the attack type from the choices given below.

Bill is attempting a series of SQL queries in order to map out the tables within the database that he is trying to exploit. Choose the attack type from the choices given below.

A.
Database Fingerprinting

B.
Database Enumeration

C.
SQL Fingerprinting

D.
SQL Enumeration



Leave a Reply 2

Your email address will not be published. Required fields are marked *


networkmanagers

networkmanagers

Correct answer is

Mufaddal Taskin

Mufaddal Taskin

I choose Ans B – Database Enumeration