Explanation: Structured Query Language (SQL) Injection is a type of attack that happens when an attacker is able to inject malicious SQL statements into a web-based application or a database, and to execute them on the database server. SQL injection exploits the vulnerability in the input validation or the database query of a web-based application, and allows the attacker to perform various actions on the database, such as retrieving, modifying, or deleting the data, executing commands, or bypassing the authentication. SQL injection works by manipulating the user input or the parameters that are sent to the web-based application or the database, and that are used to construct the SQL query. The attacker then inserts or appends the malicious SQL statements to the user input or the parameters, and tricks the web-based application or the database to execute them as part of the SQL query. In this scenario, the password shown for an administrative login event was ’ OR ’ ‘1’=‘1’ --, which is an example of a SQL injection attack. The attacker used the ’ OR ’ ‘1’=‘1’ – as the password input, and appended it to the SQL query that checks the username and password for the login. The ’ OR ’ ‘1’=‘1’ – is a logical expression that always evaluates to true, and the – is a comment symbol that ignores the rest of the SQL query. The SQL query then becomes something like this: SELECT * FROM users WHERE username = ‘admin’ AND password = ‘’ OR ‘1’=‘1’ --; This SQL query will return the record of the admin user, and allow the attacker to login as the admin without knowing the correct password. Brute force attack, cross-site scripting (XSS), or rainbow table attack are not the types of attack that happen when an attacker is able to inject malicious SQL statements into a web-based application or a database, and to execute them on the database server. Brute force attack is a type of attack that tries to guess the password or the encryption key of a system or a user by using a trial-and-error method, such as using a dictionary, a word list, or a combination of characters. XSS is a type of attack that injects malicious scripts into a web page or an application that the user views or interacts with, and that executes in the user’s web browser, and may steal the user’s cookies, session tokens, or personal information. Rainbow table attack is a type of attack that uses a precomputed table of hashed values and their corresponding plaintext values to crack the hashed passwords or encryption keys of a system or a user. References: Official (ISC)2 Guide to the CISSP CBK, Fifth Edition, Chapter 21: Software Development Security, page 2020.