A security analyst accesses corporate web pages and inputs random data in the forms. The response received includes the type of database used and SQL commands that the database accepts. Which of the following should the security analyst use to prevent this vulnerability?
A. Application fuzzing
B. Error handling
C. Input validation
D. Pointer dereference
Answer: C. Input validation
Computer Science & Information Technology
You might also like to view...
Cohesion relates to:
a. The ability to share data between modules. b. The ability to have local variables shared between modules. c. The functional independence of each module. c. All of the above.
Computer Science & Information Technology
Element ________ marks up a paragraph.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology