Hmm, I was leaning towards C) VM escape. That's where an attacker tries to break out of a virtual machine and access the underlying host system. But I suppose SQL injection is the more obvious choice here.
Yeah, I was thinking the same thing. SQL injection is the only option that really fits the description of 'taking advantage of database misconfigurations'. The other choices just don't seem as relevant.
I agree with Sheron on this one. SQL injection is definitely the way to go here. It's a common attack vector that takes advantage of poor input sanitization in web applications.
Hmm, this is a tricky one. I think the answer has to be B) SQL injection. That's a classic technique where attackers try to exploit vulnerabilities in database queries to gain unauthorized access.
Linwood
7 months agoGianna
7 months agoNickolas
7 months agoSheron
7 months agoAlida
6 months agoGeoffrey
6 months agoTheola
6 months agoMaybelle
6 months agoSimona
6 months agoBulah
6 months agoGeorgeanna
6 months ago