Input validation is a technique used to prevent which of the following application attacks?

A. memory leaks
B. privilege escalation
C. improper error handling
D. SQL injection

D
Explanation: A SQL injection attack inserts or "injects" a SQL query as the input data from the client to the application. To prevent these types of attacks, use proper input validation.

Computer Science & Information Technology

You might also like to view...

In the Trust Center, the default option in the Macro Settings is to ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

In binary tree, there is (are) ___________ pointer(s) to each node.

a. two b. one c. three d. a varying number e. no

Computer Science & Information Technology