1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serga [27]
4 years ago
11

Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti

on attack against the server. What term describes the issue that Adam discovered?
A. threat
b. vulnerability
c. risk
d. impact
Computers and Technology
1 answer:
givi [52]4 years ago
7 0

The term vulnerability describes the issue that Adam discovered.

b. vulnerability

<u>Explanation:</u>

SQL injection attack is an attack in which an external party can execute SQL commands on the database that serves as a back-end for a particular website. The SQL commands can be used to modify the contents of the website, modify the records, delete the records, and retrieve confidential information as well.  

As Adam believes that the code has an issue that allows a SQL injection attack, the term that best describes the issue that he discovered is vulnerability. The website is vulnerable since the code does not have a proper procedure to tackle a situation of SQL injection attack.

You might be interested in
Which one of these is a mem?
sweet [91]
If you are referring to a meme then the answer would be B. This is because memes are pictures that spread throughout the internet. The answer choice A would be a username. I was not able to find anything on the word mem that relates to computers but I did learn that it is the 13th letter of the Hebrew alphabet.
8 0
3 years ago
Which factor affects the gravitational force between two objects?
NNADVOKAT [17]
It depends on how far apart the 2 objects are from each other
7 0
3 years ago
Sometimes a virus will disable a system’s antivirus protection or add exceptions which prevent its being detected. Running an an
nikklg [1K]

Answer:

A boot-up CD or a USB

Explanation:

6 0
4 years ago
A secret information for using email is ____________
babymother [125]

wekipedia \:

6 0
3 years ago
Read 2 more answers
In the context of social bookmarking, what does tagging allow you to do?
tatyana61 [14]

Social bookmarking is a way for people to store, organize, search, and manage “bookmarks” of web pages. Users save links to web pages that they like or want to share, using a social bookmarking site to store these links. These bookmarks are usually public, and can be viewed by other members of the site where they are stored. Examples of social bookmarking sites include del.icio.us  and digg.com .

 

Most social bookmark services are organized by users applying “tags” or keywords to content on a Web site. This means that other users can view bookmarks that are associated with a chosen tag, and see information about the number of users who have bookmarked them. In many cases, users can also comment or vote on bookmarked items.

 

Social bookmarking is also interchangeably sometimes referred to as folksonomy, collaborative tagging, social classification, social indexing, and social tagging. “Folksonomy” is a combination of the words folk and taxonomy, hence a folksonomy is a taxonomy generated by a person or group of people

4 0
3 years ago
Read 2 more answers
Other questions:
  • C++ what is wrong with my equation?
    10·1 answer
  • Which kind of file would be hurt most by lossy compression algorithm
    8·2 answers
  • What are the ASE special certifications?
    14·2 answers
  • Help me
    14·1 answer
  • A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is
    6·1 answer
  • In what way can the use of switches in LAN networks impact overall network throughput?
    5·1 answer
  • How to reload ingenuity when a pulsating blue thing is there
    11·1 answer
  • What stage of the development process is often called the pre-alpha phase and is the "meat" of the design process where features
    5·1 answer
  • PLZ PLZ PLZ PLZ HELP I ONLY HAVE 5 MINUTES IT SAYS THE SUBJECT IS COMPUTERS AND TECHNOLOGY BUT ITS ACTUALLY MEDIA LIT
    5·1 answer
  • I NEED HELP!! THIS IS 3D COMPUTER MODELING COURSE IN CONNEXUS
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!