Bill is attempting a series of SQL queries in order to map out the tables within the database that he is trying to exploit.

Posted by: Pdfprep Category: CEH-001 Tags: , ,

Bill is attempting a series of SQL queries in order to map out the tables within the database that he is trying to exploit.

Choose the attack type from the choices given below.
A . Database Fingerprinting
B . Database Enumeration
C . SQL Fingerprinting
D . SQL Enumeration

Answer: A

Explanation:

He is trying to create a view of the characteristics of the target database, he is taking it’s fingerprints

Leave a Reply

Your email address will not be published.