Point out the wrong statement.
(a) SQL injection vulnerabilities occur whenever input is used in the construction of an SQL query without being adequately constrained or sanitized
(b) SQL injection allows an attacker to access the SQL servers and execute SQL code under the privileges of the user used to connect to the database
(c) The use of PL-SQL opens the door to these vulnerabilities
(d) None of the mentioned
The question was asked in exam.
I need to ask this question from SQL Injection in portion Developing with SQL Server of SQL Server