SAMPLE QUESTION
Which of the following best describes SQL injection?
A) A technique used to bypass firewalls and gain unauthorized access to a network.
B) A type of malware that spreads through email attachments.
C) A vulnerability that allows an attacker to manipulate database queries by injecting malicious SQL code.
D) A cryptographic algorithm used for secure data transmission.
Answer: C) A vulnerability that allows an attacker to manipulate database queries by injecting malicious SQL code.
Explanation: SQL injection occurs when an attacker inserts malicious SQL statements into an application’s input fields. This can lead to unauthorized access, data leakage, or even complete control over the database. Proper input validation and parameterized queries are essential to prevent SQL injection attacks.