Which of the following is NOT a step you should take to prevent attackers from exploiting SQL security holes?
A. limit table access
B. use stored procedures
C. use standard naming conventions
D. place the database server in a DMZ
Answer: C
Computer Science & Information Technology