List of questions
Related questions
Question 337 - CS0-003 discussion
K company has recently experienced a security breach via a public-facing service. Analysis of the event on the server was traced back to the following piece of code:
SELECT ' From userjdata WHERE Username = 0 and userid8 1 or 1=1;---
Which of the following controls would be best to implement?
A.
Deploy a wireless application protocol.
B.
Remove the end-of-life component.
C.
Implement proper access control.
D.
Validate user input.
Your answer:
0 comments
Sorted by
Leave a comment first