A security analyst accesses corporate web pages and inputs random data in the forms. The response received includes the type of database used and SQL commands that the database accepts. Which of the following should the security analyst use to prevent this vulnerability?

A. Application fuzzing
B. Error handling
C. Input validation
D. Pointer dereference

Answer: C. Input validation

Computer Science & Information Technology

You might also like to view...

Cohesion relates to:

a. The ability to share data between modules. b. The ability to have local variables shared between modules. c. The functional independence of each module. c. All of the above.

Computer Science & Information Technology

Element ________ marks up a paragraph.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology