Which of the following BEST describes a protective countermeasure for SQL injection?
A. Eliminating cross-site scripting vulnerabilities
B. Installing an IDS to monitor network traffic
C. Validating user input in web applications
D. Placing a firewall between the Internet and database servers
Answer: C. Validating user input in web applications
You might also like to view...
Which of the following can be described as an isolated guest operating system installed on top of a normal operating system?
A. virtual machine B. physical server C. host computer D. emulated PC
You must be in command mode to type text.
Answer the following statement true (T) or false (F)
The ________ function is appropriate when there are many options that do fit the desired criteria and only one option that does not fit the criteria
Fill in the blank(s) with the appropriate word(s).
____________________ is the recommended standard (RS) upon which all serial communication takes place on your PC, dates from 1969, and has not substantially changed in around 50 years.
Fill in the blank(s) with the appropriate word(s).