73. Hackers can insert some code into database query commands, and then obtain the access privilege of the database. Those codes are named as .
(A) SQL injection
(B) Instruction insertion
(C) Zero-day attach
(D) Phishing code
答案:登入後查看
統計: A(82), B(12), C(6), D(5), E(0) #2320360
統計: A(82), B(12), C(6), D(5), E(0) #2320360