Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A . web page images
B . database
C . Linux and Windows operating systems
D . user input validation in a web page or web application

Answer: D

Latest 350-701 Dumps Valid Version with 327 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
2 Comments
Inline Feedbacks
View all comments
Audioslave
Audioslave
3 years ago

This is a badly worded question but the Answer is D . User input validation in a web page or web application.
SQL injection attacks exploit the “lack of” user input validation.
A database is the asset that is exploited, a database itself is not a flaw or vulnerability.

no.no
no.no
3 years ago

“Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities? –> database
Reference: https://tools.cisco.com/security/center/resources/sql_injection