Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities? A. user input validation in a web page or web application B. Linux and Windows operating systems C. database D. web page images Suggested Answer: A Reference: https://tools.cisco.com/security/center/resources/sql_injection This question is in 350-701 exam For getting CCNP Security Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by Cisco. Trademarks, certification & product names are used for reference only and belong to Cisco.
Please login or Register to submit your answer