In a successful SQL injection attack, an attacker can potentially access, modify, or _________ data in the database.

  • Delete
  • Encrypt
  • Execute
  • Extract
In SQL injection attacks, attackers exploit vulnerabilities in input validation to inject malicious SQL code. With this injected code, attackers can extract sensitive data from the database, such as usernames, passwords, or confidential information.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *