Select from the below given scenarios, the best scenario which is most likely to cause a SQL injection attack.
The data stream given in the form of queries are embedded with invalid input.
We can differentiate between invalid and valid data stream
User’s access to a resource is not validated by the web application to which the user sends request.
Without authenticating the user, web application performs the service on behalf of the user
To get all Infosys Certified Governance, Risk and Compliance Associate Exam questions Join Telegram Group https://rebrand.ly/lex-telegram-236dee