What technique does Jimmy use to compromise a database?

Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create or alter SQL commands to gain access to private data or execute commands in the database.

What technique does Jimmy use to compromise a database?
A . Jimmy can submit user input that executes an operating system command to compromise a target system
B . Jimmy can gain control of system to flood the target system with requests, preventing legitimate users from gaining access
C . Jimmy can utilize an incorrect configuration that leads to access with higher-than expected privilege of the database
D . Jimmy can utilize this particular database threat that is an SQL injection technique to penetrate a target system

Answer: D

Latest CEH-001 Dumps Valid Version with 878 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments