In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.
(a) SQL injection
(b) SQL
(c) Direct
(d) Application
I have been asked this question in final exam.
The doubt is from Application Security in chapter Database Programming Techniques of Database Management