Stanley, a pen tester needs to perform various tests to detect SQL injection vulnerabilities. He has to make a list of all input fields whose values could be used in crafting a SQL query. This includes the hidden fields of POST requests and then test them separately, attempting to interfere with the query and cause an error to generate as a result. In which of the following tests is the source code of the application tested in a non-runtime environment to detect the SQL injection vulnerabilities?
A) Dynamic Testing
B) Static Testing
C) Function Testing
D) Source Code Testing
Correct Answer:
Verified
Q4: James, a research scholar, received an email
Q5: Identify the PRGA from the following screenshot:
Q6: Henderson has completed the pen testing tasks.
Q7: A user unknowingly installed a fake malicious
Q8: Karen is a Network engineer at ITSec,
Q10: Tom is a networking manager in XYZ
Q11: Michael, a penetration tester of Rolatac Pvt.
Q12: Rebecca, a security analyst, was auditing the
Q13: Veronica, a penetration tester at a top
Q14: Steven is performing a wireless network audit.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents