Mary is a security risk analyst for an insurance company. She is currently examining a scenario where a hacker might use a SQL injection attack to deface a web server due to a missing patch in the company's web application. In this scenario, what is the risk?

A. Unpatched web application
B. Web defacement
C. Hacker
D. Operating system

Answer: B. Web defacement

Computer Science & Information Technology

You might also like to view...

XML stands for:

A) eXpendable Marketing Language. B) eXtensible Marketing Language. C) eXpendable Markup Language. D) eXtensible Markup Language.

Computer Science & Information Technology

A flaw in the protection system of many operating systems is argument passing. Often, a common shared stack is used by all nested routines for arguments as well as for the remainder of the context of each calling process. (a) Explain what vulnerabilities this flaw presents. (b) Explain how the flaw can be controlled. The shared stack is still to be used for passing arguments and storing context

What will be an ideal response?

Computer Science & Information Technology