GK Question

technology hard mcq

Which attack exploits vulnerabilities in software by injecting malicious SQL code through input fields?

  1. XSS
  2. SQL Injection
  3. Buffer Overflow
  4. CSRF

Answer: SQL Injection

SQL Injection occurs when attackers insert malicious SQL statements into input fields to manipulate database queries. Can lead to data theft, deletion, or unauthorized access. Prevention: use parameterized queries, input validation, ORM frameworks, and least-privilege database accounts.

Topic Cybersecurity
Exam Relevance Banking, SSC JE, UPSC