ECCouncil Exam Questions

Which of the following attacks is this?

An attacker injects malicious query strings in user input fields to bypass web service
authentication mechanisms and to access back-end databases. Which of the following
attacks is this?

A.
Frame Injection Attack

B.
LDAP Injection Attack

C.
XPath Injection Attack

D.
SOAP Injection Attack

Explanation:

http://luizfirmino.blogspot.com/2011_09_01_archive.html