Certified Ethical Hacker Practice Test
Certified Ethical Hacker Web Application Security
What is SQL injection and how is it typically exploited?
Select your answer
A
Inserting malicious SQL code into application input fields to manipulate the database
B
Injecting JavaScript into web pages
C
Overflowing a buffer with SQL commands
D
Modifying SQL Server configuration files
Hint