An attacker tried to hack into the database of a reputed organization. The attacker inserted malicious code into the query of a database. What type of attack was the attacker involved in?
A. input attack
B. spoofing
C. querying
D. phishing
E. forgery