Choose the attack type from the choices given below.

Bill is attempting a series of SQL queries in order to map out the tables within the database that he
is trying to exploit.

Choose the attack type from the choices given below.

Bill is attempting a series of SQL queries in order to map out the tables within the database that he
is trying to exploit.

Choose the attack type from the choices given below.

A.
Database Fingerprinting

B.
Database Enumeration

C.
SQL Fingerprinting

D.
SQL Enumeration

Explanation:
He is trying to create a view of the characteristics of the target database,he is taking
it’s fingerprints



Leave a Reply 1

Your email address will not be published. Required fields are marked *


D

D

By def looks like should be B

An enumeration is a complete, ordered listing of all the items in a collection. The term is commonly used in mathematics and computer science to refer to a listing of all of the elements of a set.

fingerprinting
The combination of parameters may then be used to infer the remote machine’s operating system (aka, OS fingerprinting), or incorporated into a device fingerprint.