Ask Question
4 January, 13:30

Bob is developing a web application that depends upon a database backend. what type of attack could a malicious individual use to send commands through his web application to the database?

+5
Answers (1)
  1. 4 January, 17:06
    0
    Evil user can do SQL Injections to destroy the database by typing query commands in the form provided by the application that have relation with the database.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “Bob is developing a web application that depends upon a database backend. what type of attack could a malicious individual use to send ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Search for Other Answers