A bad actor bypasses authentication and reveals all records in a database through an SQL injection. Implementation of which of the following would work BEST to prevent similar attacks in

Posted by: Pdfprep Category: CS0-002 Tags: , ,

A bad actor bypasses authentication and reveals all records in a database through an SQL injection. Implementation of which of the following would work BEST to prevent similar attacks in
A . Strict input validation
B . Blacklisting
C . SQL patching
D . Content filtering
E . Output encoding

Answer: A

Leave a Reply

Your email address will not be published.