Live Virtual Machine Lab 10-3: SQL Injection
Which of the following methods can be used to prevent SQL Injection attacks? (Choose all that apply).
- Whitelist the input validation - Use stored procedures - Use parameterized queries - Use the principle of least privileged
If a web application is not coded properly, which of the following issues are likely to be encountered? 1. Unauthenticated logins 2. Unauthorized access to sensitive information 3. Unauthorized modification and deletion of data
1, 2, and 3
True or False - An SQL injection attack can allow the attacker to add, remove, modify, or manipulate data in a database.
TRUE
True or False - The SQL Injection - Blind - Boolean-Based attack provides answers in the form of true or false.
TRUE
True or False - Using SQL Injection, you can bypass website logins.
TRUE