In a ____ attack, an intruder uses only one channel for which to execute SQL injections and obtain the returned results.

A. direct channel
B. point-based
C. simple
D. single-channel

Answer: D

Computer Science & Information Technology

You might also like to view...

Rather than displaying records based on a question as in a query, a(n) ________ hides records that do not match a set criteria

Fill in the blank(s) with correct word

Computer Science & Information Technology

A web page document is contained between opening and closing ________tags

a. html b. doctype c. head d. body

Computer Science & Information Technology