Multiple Choice
A hacker could type in SQL commands into a Web form, rather than customer information, to take control of the database. This type of attack is referred to as SQL ____.
A) spam
B) injection
C) assault
D) hijack
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: You can adjust file permissions for a
Q2: _ involves the illegal copying, use, and
Q4: A hacker can remotely install _ software
Q5: A _ protects a unique symbol or
Q6: The _ of 1996 requires those in
Q7: Speech recognition, also called speaker authentication, identifies
Q8: The digitization of many forms of intellectual
Q9: A(n) _ does not attach itself to
Q10: A person neglecting to properly set the
Q11: Retinal scanning analyzes the pattern of blood