[&] SQL Injection vulnerabilities could potentially lead to remote code execution (RCE). - TRUE -- Correct - FALSE [&] SQL injection is typically classified as a type of input validation vulnerability. - TRUE - FALSE -- Correct [&] Proper input validation is a technique commonly implemented to prevent SQL Injection attacks. - FALSE - TRUE -- Correct [&] In the context of Cybersecurity, SQL Injection vulnerabilities do not pose a risk to the availability of assets like websites and databases. - TRUE - FALSE -- Correct [&] When referring to the OWASP Top 10 2017 list of vulnerabilities, what is the Technical impact score of Injection vulnerabilities? - 3 -- Correct - 5 - 2 - 4 [&] Which one of the following is not a type of Injection vulnerability? - LDAP - XSSI -- Correct - NoSQL - OS Command [&] What position do Injection vulnerabilities occupy in the OWASP Top 10 2021? - A1 - A3 -- Correct - A5 - A2 [&] Which one of the following factors is a primary cause of SQL Injection vulnerabilities? - Login or authentication forms that do not utilize Captchas - Web applications that parse parameter values in URLs - Application inputs that do not have any input sanitization -- Correct - Using open source relational databases like MySQL