A hacker could type in SQL commands into a Web form, rather than customer information, to take control of the database. This type of attack is referred to as SQL ____.
A) spam
B) injection
C) assault
D) hijack
Correct Answer:
Verified
Q93: Wireless communications can be encrypted by using
Q94: On the Internet everyone is just a
Q95: Hackers use packet-_ software to steal private
Q96: A _ is a logical address used
Q97: For random attacks, an attacker may employ
Q99: A _ protects all the ports of
Q100: When sending confidential information over the Internet,
Q101: A _ is a program that attaches
Q102: A _ Trojan opens up ports on
Q103: A(n) _ does not attach itself to
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents