Live Virtual Machine Lab 10-3: SQL Injection

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following methods can be used to prevent SQL Injection attacks? (Choose all that apply).

- Whitelist the input validation - Use stored procedures - Use parameterized queries - Use the principle of least privileged

If a web application is not coded properly, which of the following issues are likely to be encountered? 1. Unauthenticated logins 2. Unauthorized access to sensitive information 3. Unauthorized modification and deletion of data

1, 2, and 3

True or False - An SQL injection attack can allow the attacker to add, remove, modify, or manipulate data in a database.

TRUE

True or False - The SQL Injection - Blind - Boolean-Based attack provides answers in the form of true or false.

TRUE

True or False - Using SQL Injection, you can bypass website logins.

TRUE


Ensembles d'études connexes

CP Module 4The _____ principle states that development proceeds from the central part of the body to the outer parts.

View Set

Ch. 7 Strategy Formulation: Corporate Strategy M/C

View Set

Small Gas Engines Chapter 1 and 2

View Set

Chapter 24: Drugs for Seizure Disorders

View Set