List of questions
Related questions
Question 555 - 312-50v12 discussion
While performing a security audit of a web application, an ethical hacker discovers a potential vulnerability.
The application responds to logically incorrect queries with detailed error messages that divulge the underlying database's structure. The ethical hacker decides to exploit this vulnerability further. Which type of SQL Injection attack is the ethical hacker likely to use?
A.
UNION SQL Injection
B.
Blind/inferential SQL Injection
C.
In-band SQL Injection
D.
Error-based SOL Injection
Your answer:
0 comments
Sorted by
Leave a comment first