a) SQL injection
b) SQL
c) Direct
d) Application
Answer: a
Explanation: Application security has to deal with several security threats and issues beyond those handled by SQL authorization.
Related Posts
Which one of the following is not a secondary storage?
The surface area of a tape is ________ the surface area of a disk.
Which of the following is the oldest database model?
The replacement of a bad block generally is not totally automatic because
Which of the following are the process of selecting the data storage and data access characteristics of the database?
A magneto-optic disk is :
During recovery from a failure
Join The Discussion