Which of the following BEST describes a protective countermeasure for SQL injection?

A. Eliminating cross-site scripting vulnerabilities
B. Installing an IDS to monitor network traffic
C. Validating user input in web applications
D. Placing a firewall between the Internet and database servers


Answer: C. Validating user input in web applications

Computer Science & Information Technology

You might also like to view...

Which of the following can be described as an isolated guest operating system installed on top of a normal operating system?

A. virtual machine B. physical server C. host computer D. emulated PC

Computer Science & Information Technology

You must be in command mode to type text.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ________ function is appropriate when there are many options that do fit the desired criteria and only one option that does not fit the criteria

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____________________ is the recommended standard (RS) upon which all serial communication takes place on your PC, dates from 1969, and has not substantially changed in around 50 years.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology