1. If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________ a) SQL attacks b) SQL injection attacks c) SQL usage attack d) SQL destroyer attack AnswerAnswer: b [Reason:] If an attacker manages to get an application to execute an SQL…