Highly sensitive data is stored in a database and is accessed by an application on a DMZ server. The disk drives on all servers are fully encrypted. Communication between the application server and end-users is also encrypted. Network ACLs prevent any connections to the database server except from the application server. Which of the following can still result in exposure of the sensitive data in the database server?
A. SQL Injection
B. Theft of the physical database server
C. Cookies
D. Cross-site scripting
Answer: A. SQL Injection
You might also like to view...
Which of the following operators is a logical operator
A. ! B. && C. = D. <=
Write a program called thetime that displays the time of day in am or pm notation rather than in 24-hour clock time.
$ date Wed Aug 28 19:34:01 EDT 2002 $ thetime 7:21 pm Suggestion: Use the shell's built-in integer arithmetic to convert from 24-hour clock time. Then rewrite the program to use a case command instead. Rewrite it again to perform arithmetic with the expr command.
Shapes with ____ fills can take an exceptionally long time to load.
A. color B. gradient C. vector D. Both a and c
The back end of a business database consists of:
A) database forms, queries, reports and macros. B) the database tables and their data. C) database tables, forms and queries. D) database tables, queries, reports and macros.