Notifications
Clear all
Topic starter
A bad actor bypasses authentication and reveals all records in a database through an SQL injection. Implementation of which of the following would work BEST to prevent similar attacks in
- A . Strict input validation
B. Blacklisting
C. SQL patching
D. Content filtering
E. Output encoding
Suggested Answer: A
Posted : 11/02/2023 2:50 pm