CompTIA CySA+ CS0-003 Practice Question
You are conducting a vulnerability assessment on a web application. The application has a SQL injection vulnerability which can be exploited to access the application's database. The vulnerability can be triggered without any user credentials. Which of the following best describes the privileges required to exploit this vulnerability?
Root privileges
Administrative privileges
User-level privileges
None