PdfPrep.com

A bad actor bypasses authentication and reveals all records in a database through an SQL injection. Implementation of which of the following would work BEST to prevent similar attacks in

A bad actor bypasses authentication and reveals all records in a database through an SQL injection. Implementation of which of the following would work BEST to prevent similar attacks in
A . Strict input validation
B . Blacklisting
C . SQL patching
D . Content filtering
E . Output encoding

Answer: A

Exit mobile version