This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.

This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.
A . Unique SQL Injection
B . Blind SQL Injection
C . Generic SQL Injection
D . Double SQL Injection

Answer: B

Latest CEH-001 Dumps Valid Version with 878 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments