Hmm, I was leaning towards C) VM escape. That's where an attacker tries to break out of a virtual machine and access the underlying host system. But I suppose SQL injection is the more obvious choice here.
Yeah, I was thinking the same thing. SQL injection is the only option that really fits the description of 'taking advantage of database misconfigurations'. The other choices just don't seem as relevant.
I agree with Sheron on this one. SQL injection is definitely the way to go here. It's a common attack vector that takes advantage of poor input sanitization in web applications.
Hmm, this is a tricky one. I think the answer has to be B) SQL injection. That's a classic technique where attackers try to exploit vulnerabilities in database queries to gain unauthorized access.
Linwood
1 years agoGianna
1 years agoNickolas
1 years agoSheron
1 years agoAlida
11 months agoGeoffrey
11 months agoTheola
12 months agoMaybelle
12 months agoSimona
12 months agoBulah
12 months agoGeorgeanna
12 months ago