PdfPrep.com

This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.

This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.
A . Unique SQL Injection
B . Blind SQL Injection
C . Generic SQL Injection
D . Double SQL Injection

Answer: B

Exit mobile version