Which of the following is used to perform a SQL injection exploit?
a. Absinthe
b. Amap
c. SuperScan
d. ObiWan
ANS: A
Computer Science & Information Technology
You might also like to view...
A pie chart is used to display ________
A) the size of individual components proportional to a whole B) the magnitude of change over time C) comparisons of two or more individual items D) trends in data over time
Computer Science & Information Technology
Which of the following enables administrators to specify what programs are allowed to run on the desktop in a domain-based environment?
a. AppLocker b. BitLocker c. Credential Manager d. Secure Startup
Computer Science & Information Technology