Which of the following is NOT a step you should take to prevent attackers from exploiting SQL security holes?
A. limit table access
B. use stored procedures
C. use standard naming conventions
D. place the database server in a DMZ
Answer: C
Computer Science & Information Technology
You might also like to view...
You can press ____ in Windows to turn Enable Simple Buttons on or off.
A. [Ctrl][Alt][E][S] B. [Ctrl][Alt][E] C. [Ctrl][Alt][S] D. [Ctrl][Alt][B]
Computer Science & Information Technology
What are the four processes encompassed by access control?
What will be an ideal response?
Computer Science & Information Technology
When you install new hardware, you must also make sure that its _______________ are updated or compatible with the software.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following is the complement of (x && y)?
1. !x && !y 2. ! (x && y) 3. !x || !y a) 2 only b) 1 and 2 c) 3 only d) 2 and 3
Computer Science & Information Technology