View all questions & answers for the GCIH exam
Which of the following attacks allows an attacker to retrieve crucial information from a Web server's database?
Database retrieval attack
PHP injection attack
SQL injection attack
Server data attack
Submit