An application developer has coded a new application with a module to examine all user entries for the graphical user interface. The module verifies that user entries match the allowed types for each field and that OS and database commands are rejected before entries are sent for further processing within the application. These are example of:

A. Input validation
B. SQL injection
C. Application whitelisting
D. Error handling

Ans: A. Input validation

Computer Science & Information Technology

You might also like to view...

__________ chips use more than one pipeline and thus allow more than one instruction to be executed simultaneously.

a. Superscalar b. Pipelining c. Superpipelining d. The premise of this question is false.

Computer Science & Information Technology

The values the string class permits are referred to as ____.

a. string objects b. string literals c. C-strings d. istream strings

Computer Science & Information Technology