How would an attacker use this technique to compromise a database?

A particular database threat utilizes a SQL injection technique to penetrate a target system. How would an attacker use this technique to compromise a database?

A particular database threat utilizes a SQL injection technique to penetrate a target system. How would an attacker use this technique to compromise a database?

A.
An attacker uses poorly designed input validation routines to create or alter SQL commands to gain access to unintended data or execute commands of the database

B.
An attacker submits user input that executes an operating system command to compromise a target system

C.
An attacker gains control of system to flood the target system with requests, preventing legitimate users from gaining access

D.
An attacker utilizes an incorrect configuration that leads to access with higher-than-expected privilege of the database



Leave a Reply 1

Your email address will not be published. Required fields are marked *


seenagape

seenagape

Correct answer is