A particular database threat utilizes a SQL injection technique to penetrate a target system.
How would an attacker use this technique to compromise a database?
A . An attacker uses poorly designed input validation routines to create or alter SQL commands to gain access to unintended data or execute commands of the database
B . An attacker submits user input that executes an operating system command to compromise a target system
C . An attacker gains control of system to flood the target system with requests, preventing legitimate users from gaining access
D . An attacker utilizes an incorrect configuration that leads to access with higher-thanexpected privilege of the database
Answer: A
Explanation:
Using the poorly designed input validation to alter or steal data from a database is a SQL injection attack.
Leave a Reply