Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A . user input validation in a web page or web application
B . Linux and Windows operating systems
C . database
D . web page images
Answer: C
Explanation:
Reference: https://tools.cisco.com/security/center/resources/sql_injection
Latest 350-701 Dumps Valid Version with 327 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund