In a ____ attack, an intruder uses only one channel for which to execute SQL injections and obtain the returned results.
A. direct channel
B. point-based
C. simple
D. single-channel
Answer: D
Computer Science & Information Technology
You might also like to view...
Rather than displaying records based on a question as in a query, a(n) ________ hides records that do not match a set criteria
Fill in the blank(s) with correct word
Computer Science & Information Technology
A web page document is contained between opening and closing ________tags
a. html b. doctype c. head d. body
Computer Science & Information Technology