A. It is an attack used to gain unauthorized access to a database.
B. It is an attack used to modify code in an application.
C. It is a Denial of Service Attack.
D. It is a Man-in-the-Middle attack between your SQL Server and Web App Server.