To identify the exactcommand or input usedduring a SQL injection attack, theapplication log (B)is the most relevant. It records inputs, errors, and processing activities within the application layer.
UnderDomain 2.1, CompTIA emphasizes reviewingapplication logsto detect indicators of malicious activity, includingweb application attackslike SQL injection.
[Reference: CompTIA Security+ SY0-701 Objectives, Domain 2.1 – “Indicators of malicious activity: SQL injection; review application logs.”, , , , ]
Submit