PrepAway - Latest Free Exam Questions & Answers

Which of the following types of application attacks would be used to specifically gain unauthorized informatio

Which of the following types of application attacks would be used to specifically gain unauthorized
information from databases that did not have any input validation implemented?

PrepAway - Latest Free Exam Questions & Answers

A.
SQL injection

B.
Session hijacking and XML injection

C.
Cookies and attachments

D.
Buffer overflow and XSS

Explanation:
To access information in databases, you use SQL. To gain unauthorized information from
databases, a SQL Injection attack is used.

SQL injection is a code injection technique, used to attack data-driven applications, in which
malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database
contents to the attacker). SQL injection must exploit a security vulnerability in an application’s
software, for example, when user input is either incorrectly filtered for string literal escape
characters embedded in SQL statements or user input is not strongly typed and unexpectedly
executed. SQL injection is mostly known as an attack vector for websites but can be used to
attack any type of SQL database.


Leave a Reply