Question
One of the primary ways hackers gain access to e-commerce sites is through SQL injection. Which of the following explains how this is done?
(1 point)
Responses
Code is deleted from the back-end of the database.
Code is deleted from the back-end of the database.
Code is deleted from the front-end of the site.
Code is deleted from the front-end of the site.
Code is added to the back-end of the database.
Code is added to the back-end of the database.
Code is added to the front-end of the site.
(1 point)
Responses
Code is deleted from the back-end of the database.
Code is deleted from the back-end of the database.
Code is deleted from the front-end of the site.
Code is deleted from the front-end of the site.
Code is added to the back-end of the database.
Code is added to the back-end of the database.
Code is added to the front-end of the site.
Answers
GPT-4o mini
The correct response is:
**Code is added to the back-end of the database.**
SQL injection allows attackers to manipulate SQL queries by injecting malicious code into input fields, enabling them to interact with the database in unauthorized ways.
**Code is added to the back-end of the database.**
SQL injection allows attackers to manipulate SQL queries by injecting malicious code into input fields, enabling them to interact with the database in unauthorized ways.