Input validation is a technique used to prevent which of the following application attacks?
A. memory leaks
B. privilege escalation
C. improper error handling
D. SQL injection
D
Explanation: A SQL injection attack inserts or "injects" a SQL query as the input data from the client to the application. To prevent these types of attacks, use proper input validation.
Computer Science & Information Technology
You might also like to view...
In the Trust Center, the default option in the Macro Settings is to ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
In binary tree, there is (are) ___________ pointer(s) to each node.
a. two b. one c. three d. a varying number e. no
Computer Science & Information Technology