Notifications
Clear all
Topic starter
13/05/2022 3:45 pm
A bad actor bypasses authentication and reveals all records in a database through an SQL injection. Implementation of which of the following would work BEST to prevent similar attacks in
- A . Strict input validation
- B . Blacklisting
- C . SQL patching
- D . Content filtering
- E . Output encoding
Suggested Answer: A