Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level
LPI Level 1
LPI Level 2
LPI Level 3
Contact
Jimmy can submit user input that executes an operating system command to compromise a target system
What technique does Jimmy use to compromise a database?