Multiple Choice
What is a SQL injection attack?
A) It is an attack when the perpetrator is inserting malicious query in input such that it is passed to and executed by an application program.
B) It is an attack when the perpetrator is inputting so much data that the input buffer overflows.The overflow contains code that takes control of the company's computer.
C) It is an attack when the perpetrator uses software to guess company's addresses,send employees blank e-mails,and add unreturned messages to spammer e-mail list.
D) It is an attacked when the perpetrator sends hundreds of messages from randomly generated false addresses,overloading an Internet service provider's e-mail server.
Correct Answer:

Verified
Correct Answer:
Verified
Q66: Illegally obtaining and using confidential information about
Q67: Taking control of a phone to make
Q68: Creating a seemingly legitimate business,collecting personal data
Q69: Hunter Carr is an accountant with AcctSmart.The
Q70: In November of 2005 it was discovered
Q72: Ashley Baker works in the information technology
Q73: Computers that are part of a botnet
Q74: Using a small device with storage capacity
Q75: Social engineering is<br>A)verifying credit card validity;buying and
Q76: What is social engineering? Provide an example.