Title | |
---|---|
Which of the following statement is TRUE about SQL Injection?Which of the following statement is TRUE about SQL Injection?
The answer is:
C. SQL Injection is a Code Penetration Technique
|
|
At which of the following stage does SQL Injection occurs?At which of the following stage does SQL Injection occurs?
The answer is:
D. When the user is asked to input username
|
|
Which of the following is the type of SQL Injection attack?Which of the following is the type of SQL Injection attack?
The answer is:
D. All of the above
|
|
Which of the following is TRUE about the type of SQL Injection attack?Which of the following is TRUE about the type of SQL Injection attack?
The answer is:
D. All of the above
|
|
Select the correct statement which will return all the rows from the Table and then also deletes the Table_Add table?Select the correct statement which will return all the rows from the Table and then also deletes the Table_Add table?
The answer is:
A. SELECT * FROM Table; DROP TABLE Table_Add
|
|
Through which system, we can detect SQL Injection attacks?Through which system, we can detect SQL Injection attacks?
The answer is:
C. Intrusion Detection System
|
|
Which of the following is TRUE about Intrusion Detection System?Which of the following is TRUE about Intrusion Detection System?
The answer is:
C. Both A) and B)
|
|
Network-based IDS can be used to monitor –Network-based IDS can be used to monitor –
The answer is:
C. All connections to the database server
|
|
Host-based IDS can be used to monitor –Host-based IDS can be used to monitor –
The answer is:
C. Both A) and B)
|
|
How can we prevent SQL Injection attack?How can we prevent SQL Injection attack?
The answer is:
D. All of the above
|
MCQs
Views
Best Answers
Points