Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A . user input validation in a web page or web application
B . Linux and Windows operating systems
C . database
D . web page images

Answer: C

Explanation:

Reference: https://tools.cisco.com/security/center/resources/sql_injection

Latest 350-701 Dumps Valid Version with 327 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
2 Comments
Inline Feedbacks
View all comments
Cock
Cock
3 years ago

A

ccnp_kid
ccnp_kid
3 years ago

A . user input validation in a web page or web application—

A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system’s security policy.