An attacker tries to retrieve the data and exploit the websites by altering database by inputting queries. Which attack technique is used?

Broken authentication

SQL Injection

XML External Entities

Security Misconfiguration

Verified Answer
Correct Option - b

To get all Infosys Certified Associate in Cyber Security Fundamentals Exam questions Join Telegram Group https://rebrand.ly/lex-telegram-236dee

Telegram