Which tool is best suited for identifying applications and code on a Web server that can lead to a SQL injection attack?
A.
A vulnerability scanner
B.
A packet sniffer
C.
An intrusion-detection system
D.
A network switch
Which tool is best suited for identifying applications and code on a Web server that can lead to a SQL injection attack?
Which tool is best suited for identifying applications and code on a Web server that can lead to a SQL injection attack?
A.
A vulnerability scanner
B.
A packet sniffer
C.
An intrusion-detection system
D.
A network switch