Posted by: Pdfprep
Post Date: April 18, 2021
A bad actor bypasses authentication and reveals all records in a database through an SQL injection. Implementation of which of the following would work BEST to prevent similar attacks in
A . Strict input validation
B . Blacklisting
C . SQL patching
D . Content filtering
E . Output encoding
Answer: A
Leave a Reply