Which of the following is used to perform a SQL injection exploit?

a. Absinthe
b. Amap
c. SuperScan
d. ObiWan

ANS: A

Computer Science & Information Technology

You might also like to view...

A pie chart is used to display ________

A) the size of individual components proportional to a whole B) the magnitude of change over time C) comparisons of two or more individual items D) trends in data over time

Computer Science & Information Technology

Which of the following enables administrators to specify what programs are allowed to run on the desktop in a domain-based environment?

a. AppLocker b. BitLocker c. Credential Manager d. Secure Startup

Computer Science & Information Technology