Which of the following is NOT a step you should take to prevent attackers from exploiting SQL security holes?

A. limit table access
B. use stored procedures
C. use standard naming conventions
D. place the database server in a DMZ

Answer: C

Computer Science & Information Technology

You might also like to view...

How many DS0s are used in a T1?

A. 24 B. 30 C. 23 D. 31

Computer Science & Information Technology

Why is so much attention today focused on object-oriented programming?

What will be an ideal response?

Computer Science & Information Technology