If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________
(a) SQL attacks
(b) SQL injection attacks
(c) SQL usage attack
(d) SQL destroyer attack
The question was posed to me during an interview.
Origin of the question is Application Security topic in chapter Application Design and Development of RDBMS