Input validation is a technique used to prevent which of the following application attacks?
A. memory leaks
B. privilege escalation
C. improper error handling
D. SQL injection
D
Explanation: A SQL injection attack inserts or "injects" a SQL query as the input data from the client to the application. To prevent these types of attacks, use proper input validation.
You might also like to view...
Which of the following are linked list operations?
A) adding an item B) traversing the list C) removing an item D) All of the above E) None of the above
SQL statements that are stored in a database can be invoked using an object that implements interface ________.
a. Callable b. StoredStatement c. CallableStatement d. Connection
?An example for using an appropriate style while preparing a written document is using a conversational tone in formal documents and a business tone in informal documents.
Answer the following statement true (T) or false (F)
You want to try out a software package that runs on Linux and you want to run it as a VM in VMware Workstation Player. You don't want to have to install Linux and the software package, what should you do?
A. download a virtual appliance B. find an old machine with the software installed C. create a virtual disk and mount it D. install the integration services