This attack technique is used when a Web application is vulnerable to an SQL Injection but the
results of the Injection are not visible to the attacker.
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
Unique SQL Injection
B.
Blind SQL Injection
C.
Generic SQL Injection
D.
Double SQL Injection