Hmm, I was leaning towards C) VM escape. That's where an attacker tries to break out of a virtual machine and access the underlying host system. But I suppose SQL injection is the more obvious choice here.
Yeah, I was thinking the same thing. SQL injection is the only option that really fits the description of 'taking advantage of database misconfigurations'. The other choices just don't seem as relevant.
I agree with Sheron on this one. SQL injection is definitely the way to go here. It's a common attack vector that takes advantage of poor input sanitization in web applications.
Hmm, this is a tricky one. I think the answer has to be B) SQL injection. That's a classic technique where attackers try to exploit vulnerabilities in database queries to gain unauthorized access.
Linwood
9 months agoGianna
10 months agoNickolas
10 months agoSheron
10 months agoAlida
9 months agoGeoffrey
9 months agoTheola
9 months agoMaybelle
9 months agoSimona
9 months agoBulah
9 months agoGeorgeanna
9 months ago