Fill in the blank: Security professionals can use _____ to interact with and request information from a database.

Foundations of Cybersecurity | Weekly challenge 4 Quiz

Fill in the blank: Security professionals can use _____ to interact with and request information from a database.

  • playbooks
  • network protocol analyzers (packet sniffers)
  • SQL
  • logs

 

Leave a Comment