Select from the below given scenarios, the best scenario which is most likely to cause a SQL injection attack.

The data stream given in the form of queries are embedded with invalid input.

We can differentiate between invalid and valid data stream

User’s access to a resource is not validated by the web application to which the user sends request.

Without authenticating the user, web application performs the service on behalf of the user

Correct Option - a

To get all Infosys Certified Governance, Risk and Compliance Associate Exam questions Join Group https://bit.ly/infy_premium_group

We're passionate about offering best placement materials and courses!! A one stop place for Placement Materials. We daily post Offcampus updates and Placement Materials.

Qtr No. 213, New Town Yehlanka Indore 454775

admin@prepflix.in