An application developer has coded a new application with a module to examine all user entries for the graphical user interface. The module verifies that user entries match the allowed types for each field and that OS and database commands are rejected before entries are sent for further processing within the application. These are example of:
A. Input validation
B. SQL injection
C. Application whitelisting
D. Error handling
Ans: A. Input validation
Computer Science & Information Technology
You might also like to view...
__________ chips use more than one pipeline and thus allow more than one instruction to be executed simultaneously.
a. Superscalar b. Pipelining c. Superpipelining d. The premise of this question is false.
Computer Science & Information Technology
The values the string class permits are referred to as ____.
a. string objects b. string literals c. C-strings d. istream strings
Computer Science & Information Technology