In an __________________, the attacker seeks to use a web application to gain access to an underlying database. Semicolons and apostrophes are characteristic of this attack.
a. SQL injection attack
b. Cross-site scripting (XSS) attack
c. Cross-site request forgery (CSRF) attack
d. Remote code execution (RCE) attack