ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 10 Topic 2 Discussion

ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 10 Topic 2 Discussion

EC0-350 Exam Topic 2 Question 10 Discussion:
Question #: 10
Topic #: 2

This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.


A.

Unique SQL Injection


B.

Blind SQL Injection


C.

Generic SQL Injection


D.

Double SQL Injection


Get Premium EC0-350 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.