Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A . web page images
B . database
C . Linux and Windows operating systems
D . user input validation in a web page or web application
Answer: D
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A . web page images
B . database
C . Linux and Windows operating systems
D . user input validation in a web page or web application
Answer: D