Foundations of Cybersecurity | Weekly challenge 4 Quiz
Fill in the blank: Security professionals can use _____ to interact with and request information from a database.
- playbooks
- network protocol analyzers (packet sniffers)
- SQL
- logs
Foundations of Cybersecurity | Weekly challenge 4 Quiz
Fill in the blank: Security professionals can use _____ to interact with and request information from a database.