Highly sensitive data is stored in a database and is accessed by an application on a DMZ server. The disk drives on all servers are fully encrypted. Communication between the application server and end-users is also encrypted. Network ACLs prevent any connections to the database server except from the application server. Which of the following can still result in exposure of the sensitive data in the database server?

A. SQL Injection
B. Theft of the physical database server
C. Cookies
D. Cross-site scripting


Answer: A. SQL Injection

Computer Science & Information Technology

You might also like to view...

Which of the following operators is a logical operator

A. ! B. && C. = D. <=

Computer Science & Information Technology

Write a program called thetime that displays the time of day in am or pm notation rather than in 24-hour clock time.

$ date Wed Aug 28 19:34:01 EDT 2002 $ thetime 7:21 pm Suggestion: Use the shell's built-in integer arithmetic to convert from 24-hour clock time. Then rewrite the program to use a case command instead. Rewrite it again to perform arithmetic with the expr command.

Computer Science & Information Technology

Shapes with ____ fills can take an exceptionally long time to load.

A. color B. gradient C. vector D. Both a and c

Computer Science & Information Technology

The back end of a business database consists of:

A) database forms, queries, reports and macros. B) the database tables and their data. C) database tables, forms and queries. D) database tables, queries, reports and macros.

Computer Science & Information Technology