An attacker tries to retrieve the data and exploit the websites by altering database by inputting queries. Which attack technique is used?

Broken authentication

SQL Injection

XML External Entities

Security Misconfiguration

Correct Option - b

To get all Infosys Certified Associate in Cyber Security Fundamentals Exam questions Join Group https://bit.ly/infy_premium_group

We're passionate about offering best placement materials and courses!! A one stop place for Placement Materials. We daily post Offcampus updates and Placement Materials.

Qtr No. 213, New Town Yehlanka Indore 454775

admin@prepflix.in