Which two action would you perform to address this vulnerability?

During a security audit, it is noted that your application is vulnerable to SQL Injection attacks.
Which two action would you perform to address this vulnerability?
A. Use parameterized stored procedures with the embedded parameters.
B. Add a text input validation filter to check user-supplied data.
C. Configure user permissions in the deployment descriptor.
D. Configure security roles in the deployment descriptor.
E. Deploy the Internet facing nodes in a well defined demilitarized zone (DMZ) layer.
F. Use parameterized stored procedures with the principle of least privilege.

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.