Input validation is a technique used to prevent which of the following application attacks?

A. memory leaks
B. privilege escalation
C. improper error handling
D. SQL injection


D
Explanation: A SQL injection attack inserts or "injects" a SQL query as the input data from the client to the application. To prevent these types of attacks, use proper input validation.

Computer Science & Information Technology

You might also like to view...

Which of the following are linked list operations?

A) adding an item B) traversing the list C) removing an item D) All of the above E) None of the above

Computer Science & Information Technology

SQL statements that are stored in a database can be invoked using an object that implements interface ________.

a. Callable b. StoredStatement c. CallableStatement d. Connection

Computer Science & Information Technology

?An example for using an appropriate style while preparing a written document is using a conversational tone in formal documents and a business tone in informal documents.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You want to try out a software package that runs on Linux and you want to run it as a VM in VMware Workstation Player. You don't want to have to install Linux and the software package, what should you do?

A. download a virtual appliance B. find an old machine with the software installed C. create a virtual disk and mount it D. install the integration services

Computer Science & Information Technology