Hmm, I was leaning towards C) VM escape. That's where an attacker tries to break out of a virtual machine and access the underlying host system. But I suppose SQL injection is the more obvious choice here.
Yeah, I was thinking the same thing. SQL injection is the only option that really fits the description of 'taking advantage of database misconfigurations'. The other choices just don't seem as relevant.
I agree with Sheron on this one. SQL injection is definitely the way to go here. It's a common attack vector that takes advantage of poor input sanitization in web applications.
Hmm, this is a tricky one. I think the answer has to be B) SQL injection. That's a classic technique where attackers try to exploit vulnerabilities in database queries to gain unauthorized access.
Linwood
8 months agoGianna
8 months agoNickolas
8 months agoSheron
8 months agoAlida
7 months agoGeoffrey
7 months agoTheola
8 months agoMaybelle
8 months agoSimona
8 months agoBulah
8 months agoGeorgeanna
8 months ago