Which action cannot be performed
through a successful SQL injection attack?
a. Discover the names of different fields
in a table
b. Reformat the web application server’s
hard drive
c. Display a list of customer telephone
numbers
d. Erase a database table
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here