How would an attacker use this technique to compromise a database?

Posted by: Pdfprep Category: CEH-001 Tags: , ,

A particular database threat utilizes a SQL injection technique to penetrate a target system.

How would an attacker use this technique to compromise a database?
A . An attacker uses poorly designed input validation routines to create or alter SQL commands to gain access to unintended data or execute commands of the database
B . An attacker submits user input that executes an operating system command to compromise a target system
C . An attacker gains control of system to flood the target system with requests, preventing legitimate users from gaining access
D . An attacker utilizes an incorrect configuration that leads to access with higher-than­expected privilege of the database

Answer: A

Explanation:

Using the poorly designed input validation to alter or steal data from a database is a SQL injection attack.

Leave a Reply

Your email address will not be published.