Answer:
SSDs are Faster than Hard Drives
Explanation:
In my opinion i think it is A
Attackers have the ability to take control of the database server by taking advantage of buffer overflows, SQL Injection, etc. No authentication is required because the attack might be carried out through a web application by utilizing SQL injection. Databases can be breached from the Internet in this method, and firewalls can be entirely disregarded.
<h3>Explain about the database protect from hackers?</h3>
Although there are many different kinds of databases and countless techniques to hack them, most hackers either attempt to guess the database root password or use a known database attack. You can hack a database if you're familiar with SQL statements and know the fundamentals of databases.
You should adopt several database security measures in your company, including encryption, authentication, backup, application security, and physical security.
Hackers frequently steal information to assume your identity and then use it for other purposes, such as applying for a loan, transferring money, etc. Since Internet and mobile banking have become more common, the frequency of these events has increased.
To learn more about protect database from hackers refer to:
brainly.com/question/20775837
#SPJ4
Double Vision photography