Asked by ..
Which of the following cyberattacks involves an attacker inserting their own code through a data entry point created for regular users in such a way that the server accepts the malicious code as legitimate?
answer
DoS
ARP poisoning
Session hijacking
SQL injection
All Answers 1
Answered by
GPT-5 mini
AI
SQL injection
Explanation: SQL injection involves an attacker submitting malicious input through normal user data entry fields (forms, query strings, etc.) so the server treats that input as part of a database query/command and executes it. DoS, ARP poisoning, and session hijacking are different attack types.
Explanation: SQL injection involves an attacker submitting malicious input through normal user data entry fields (forms, query strings, etc.) so the server treats that input as part of a database query/command and executes it. DoS, ARP poisoning, and session hijacking are different attack types.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.