List of questions
Related questions
Question 2 - 350-701 discussion
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A.
user input validation in a web page or web application
B.
Linux and Windows operating systems
C.
database
D.
web page images
Your answer:
0 comments
Sorted by
Leave a comment first