Similar Collections


    No collections found

questions

Title
Which of the following statement is TRUE about SQL Injection?

Which of the following statement is TRUE about SQL Injection?


  1. SQL Injection is an Object Penetration Technique
  2. SQL Injection is a Function Penetration Technique
  3. SQL Injection is a Code Penetration Technique
  4. SQL Injection is a Database Penetration Technique
discuss
At which of the following stage does SQL Injection occurs?

At which of the following stage does SQL Injection occurs?


  1. When the user is asked to logout
  2. When the user is asked to input password
  3. When the user is asked to input captcha
  4. When the user is asked to input username
discuss
Which of the following is the type of SQL Injection attack?

Which of the following is the type of SQL Injection attack?


  1. It inserts the data
  2. It updates the data
  3. It deletes the data
  4. All of the above
discuss
Which of the following is TRUE about the type of SQL Injection attack?

Which of the following is TRUE about the type of SQL Injection attack?


  1. Install malicious program
  2. Export valuable data
  3. Get user login detail
  4. All of the above
discuss
Select the correct statement which will return all the rows from the Table and then also deletes the Table_Add table?

Select the correct statement which will return all the rows from the Table and then also deletes the Table_Add table?


  1. SELECT * FROM Table; DROP TABLE Table_Add
  2. SELECT * WHERE Table; DROP TABLE Table_Add
  3. SELECT * FROM Table; DELETE TABLE Table_Add
  4. SELECT * WHERE Table; DELETE TABLE Table_Add
discuss
Through which system, we can detect SQL Injection attacks?

Through which system, we can detect SQL Injection attacks?


  1. Injection Detection System
  2. Attack Detection System
  3. Intrusion Detection System
  4. None of the above
discuss
Which of the following is TRUE about Intrusion Detection System?

Which of the following is TRUE about Intrusion Detection System?


  1. Intrusion Detection System is Network-based
  2. Intrusion Detection System is Host-based
  3. Both A) and B)
  4. None of the above
discuss
Network-based IDS can be used to monitor –

Network-based IDS can be used to monitor –


  1. Web server logs
  2. When something weird occurs
  3. All connections to the database server
  4. None of the above
discuss
Host-based IDS can be used to monitor –

Host-based IDS can be used to monitor –


  1. Web server logs
  2. When something weird occurs
  3. Both A) and B)
  4. None of the above
discuss
How can we prevent SQL Injection attack?

How can we prevent SQL Injection attack?


  1. We should pre-define the input type, input field and length of the user data to validate the input for the user authentication.
  2. Access privileges should be restricted for the users
  3. Administrator accounts should not be used.
  4. All of the above
discuss
total MCQs: 10

MCQs

10

Views

73

Best Answers

299

Points

5