subject

An attacker tried to hack into the database of a reputed organization. the attacker inserted malicious code into the query of a database. what type of attack was the attacker involved in?
a. input attack
b. spoofing
c. querying
d. phishing
e. forgery

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 08:00
Match the items with their respective descriptions.
Answers: 1
question
Computers and Technology, 23.06.2019 22:20
Learning sign language is an example of a(n) learning sign language is an example of a(n)
Answers: 2
question
Computers and Technology, 24.06.2019 07:30
Aproject involves many computing systems working together on disjointed task towards a single goal what form of computing would the project be using
Answers: 3
question
Computers and Technology, 24.06.2019 11:00
Which of the statements below describe the guidelines for the use of text in presentation programs? a. do not use numbered lists. b. fonts should be appropriate for your audience. c. limit the number of fonts you use to three or four. d. only use bulleted lists for sales promotions. e. select font sizes that are appropriate for your delivery method. f. use font colors that work well with your background. select all that apply
Answers: 1
You know the right answer?
An attacker tried to hack into the database of a reputed organization. the attacker inserted malicio...
Questions
question
Mathematics, 13.03.2020 19:54
Questions on the website: 13722363