Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.

a) SQL injection
b) SQL
c) Direct
d) Application

Answer: a
Explanation: Application security has to deal with several security threats and issues beyond those handled by SQL authorization.

Join The Discussion