Your boss Tess King is attempting to modify the parameters of a Web-based application in order
to alter the SQL statements that are parsed to retrieve data from the database. What would you
call such an attack?
A.
SQL Input attack
B.
SQL Piggybacking attack
C.
SQL Select attack
D.
SQL Injection attack
Explanation:
This technique is known as SQL injection attack