Which of the following is true about input validation in a client-server architecture, when data integrity is critical to the organization?
A. It should be enforced on the client side only.
B. It must be protected by SSL encryption.
C. It must rely on the user's knowledge of the application.
D. It should be performed on the server side.
Answer: D. It should be performed on the server side.
You might also like to view...
Give examples of schedules at the SNAPSHOT isolation that are
a. Serializable and hence correct. b. Nonserializable and incorrect.
Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?
A. RPC attacks B. ICMP message abuse C. malicious port scanning D. SYN flood
Laptops often provide a video port for hooking up an external monitor, though wireless screen sharing and _______________ are gaining popularity as an alternative.
Fill in the blank(s) with the appropriate word(s).
A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?
A. Four port wireless router B. Four port switch C. Four port hub D. Four port WAP