Isaca CCOA Question Answer
An organization was breached via a web application attack to a database in which user inputs were not validated. This can BEST be described as which type of attack?
Isaca CCOA Question Answer
An organization was breached via a web application attack to a database in which user inputs were not validated. This can BEST be described as which type of attack?