Go back to 312-50 - Ethical Hacking and Countermeasures (CEHv6)

Question :-

Bill is attempting a series of SQL queries in order to map out the tables within the database that he is trying to exploit. Choose the attack type from the choices given below.
Database Fingerprinting
Database Enumeration
SQL Fingerprinting
SQL Enumeration

Want to practice for 312-50 - Ethical Hacking and Countermeasures (CEHv6) ? Click here.