CEH

(Jeff_L) #1

346 Chapter 14 ■ SQL Injection



  1. is used to audit databases.
    A. Ping
    B. IPConfig
    C. SQLping
    D. Traceroute

  2. Browsers do not display.
    A. ActiveX
    B. Hidden fields
    C. Java
    D. JavaScript

  3. Proper input validation can prevent what from occurring?
    A. Client-side issues
    B. Operating system exploits
    C. SQL injection attacks
    D. Software failure

  4. can be used to attack databases.
    A. Buffer overflows
    B. SQL injection
    C. Buffer injection
    D. Input validation

  5. Which command can be used to access the command prompt in SQL Server?
    A. WHERE
    B. SELECT
    C. xp_cmdshell
    D. cmdshell

  6. Which command is used to query data in SQL Server?
    A. cmdshell
    B. WHERE
    C. SELECT
    D. from

  7. Which statement is used to limit data in SQL Server?
    A. cmdshell
    B. WHERE
    C. SELECT
    D. to

Free download pdf