Which of the following is NOT a step you should take to prevent attackers from exploiting SQL security holes?

A. limit table access
B. use stored procedures
C. use standard naming conventions
D. place the database server in a DMZ


Answer: C

Computer Science & Information Technology

You might also like to view...

You can press ____ in Windows to turn Enable Simple Buttons on or off.

A. [Ctrl][Alt][E][S] B. [Ctrl][Alt][E] C. [Ctrl][Alt][S] D. [Ctrl][Alt][B]

Computer Science & Information Technology

What are the four processes encompassed by access control?

What will be an ideal response?

Computer Science & Information Technology

When you install new hardware, you must also make sure that its _______________ are updated or compatible with the software.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is the complement of (x && y)?

1. !x && !y 2. ! (x && y) 3. !x || !y a) 2 only b) 1 and 2 c) 3 only d) 2 and 3

Computer Science & Information Technology